ANSWERS 100% CORRECT
Through which of the following can port scans gain information about Windows IPC
administrative share information?
A.NULL Sessions
B. Telnet
C. Web browser
D. Social Engineering - ANSWERNull Sessions
NetBIOS enumeration can allow ___________.
A. Registry enumeration
B. Trusted domain enumeration
C. User enumeration
D. All of the above - ANSWERAll of the above
Which of the following best describes what occurs when a lower-level account is
cracked in order to obtain increased access?
A. NULL session
B. Privilege escalation
C. Enumeration
D. Backdoor - ANSWERPrivilege escalation
Which of the following is an attack that uses the rights of a low-privilege user to assume
higher privileges?
a. Root attack
b. User emulation
c. Rights modification
d. Privilege escalation - ANSWERPrivilege Escalation
Installing Netcat on a remote system by using an exploit is an example of what type of
attack?
A. Privilege escalation
B. Default software exploit
C. Installing a back door
D. Rootkit installation - ANSWERInstalling a back door
Enumeration can be used to discover all but which of the following types of information?
A. Smartcard PINs
B. Ports