02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

148 Chapter 6 ■ Enumeration of Services<br />

7. An attacker can use to enumerate users on a system.<br />

A. NetBIOS<br />

B. TCP/IP<br />

C. NetBEUI<br />

D. NNTP<br />

8. A is used to connect to a remote system using NetBIOS.<br />

A. NULL session<br />

B. Hash<br />

C. Rainbow table<br />

D. Rootkit<br />

9. is used to synchronize clocks on a network.<br />

A. SAM<br />

B. NTP<br />

C. NetBIOS<br />

D. FTP<br />

10. Port number is used for SMTP.<br />

A. 25<br />

B. 110<br />

C. 389<br />

D. 52<br />

11. Port number is used by DNS for zone transfers.<br />

A. 53 TCP<br />

B. 53 UDP<br />

C. 25 TCP<br />

D. 25 UDP<br />

12. Which command can be used to view NetBIOS information?<br />

A. netstat<br />

B. nmap<br />

C. nbtstat<br />

D. telnet

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!