Deck 6: Enumeration

Full screen (f)
exit full mode
Question
The open-source descendant of Nessus is called ____.

A)NW
B)WNessus
C)OpenVAS
D)WinNessus
Use Space or
up arrow
down arrow
to flip the card.
Question
Windows 98 introduced the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
Question
In ____, instead of peer-to-peer networks, a client/server model was created in which a server was responsible for authenticating users and giving them access to resources on a network.

A)Windows 95
B)Windows 98
C)Windows Me
D)Windows NT 3.51
Question
The ____ command gives you a quick way to see whether there are any shared resources on a computer or server.

A)Nbtstat
B)Net view
C)NetDDE
D)Netmon Agent
Question
The enumeration process for Windows Me is the same as for Windows 98.
Question
____ implemented Windows File Protection to prevent core system files from being overwritten.

A)Windows 95
B)Windows 98
C)Windows NT 3.51
D)Windows XP Professional
Question
Windows 95 uses the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
Question
The most recent version of Novell OS is called ____.

A)NetWare 6.0
B)NetWare 6.5
C)Novell Open Enterprise Server
D)Novell NetWare 4.0 Server
Question
NBTscan is a tool for enumerating Windows OSs.
Question
NetBIOS names have a limit of ____ characters.

A)8
B)12
C)16
D)24
Question
The computer names you assign to Windows systems are called ____ names.

A)Active Directory
B)NetBIOS
C)NetDDE
D)IIS
Question
The Netmon Agent is a Linux network-monitoring tool.
Question
One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.

A)open session
B)unauthorized session
C)void session
D)null session
Question
A NetBIOS name does not need to be unique on a network.
Question
____ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas.

A)IIS
B)Zion
C)NetDDE
D)Hyena
Question
____ is an enhancement to NDS (NetWare Directory Services).

A)Active Directory
B)Bindery
C)X.500
D)eDirectory
Question
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems.
Question
Windows NT 3.51 uses the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
Question
____ is a system process that runs on Windows OSs to facilitate the exchange of network data.

A)NetBIOS
B)Active Directory
C)NetDDE
D)IIS
Question
The ____ command is a powerful enumeration tool included with Windows.

A)NessusWX
B)Nbtstat
C)NetDDE
D)Netmon Agent
Question
The most popular enumeration tool for security testers and hackers alike is the ____ utility, which enables you to find out who is logged in to a *nix system with one simple command.

A)Whois
B)Finger
C)Ping
D)Who
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
replaced the Registry with Active Directory for object storage
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
encompasses four editions; each is targeted to different markets with different features
Question
Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system's hardware and software.
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
developed by Sun Microsystems
Question
Many password-guessing programs are available that can determine a password in a matter of seconds. One such program the Department of Defense uses is ____________________.
Question
Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
developed by contributors and sponsored by Red Hat
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
more stable than its predecessor, with an improved file system (FAT32)
Question
NetWare's ____ is a graphical Java utility for centralized network administration.

A)ConsoleOne
B)Bindery
C)eDirectory
D)Client32
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
uses SUSE Linux as its OS
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
first Microsoft GUI product that did not rely on DOS
Question
With ____, you can have your desktop computer or laptop start in both Windows and Linux.

A)Grand Unified Bootloader
B)FreeBSD Boot
C)NetWare Connect 5.0
D)Connection Client
Question
LDAP (port ____) is the protocol used to access Novell's eDirectory, Microsoft Active Directory, and Apple Open Directory.

A)52
B)89
C)128
D)389
Question
The "NBT" part of "NBTscan" is an abbreviation for ____________________ over TCP/IP.
Question
_____________________________________________ is a Windows programming interface that allows computers to communicate across a local area network (LAN).
Question
To determine what resources or shares are on a network, security testers must first determine what _________________________ is being used via port scanning and footprinting.
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
domains are emphasized in this OS instead of workgroups
Question
In NetWare 5.0, TCP/IP replaced ____ as the default protocol.

A)NetBIOS
B)IPX/SPX
C)ATM
D)LDAP
Question
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
the kernel data structures were made read only to prevent rogue applications from affecting the core of the operating system
Question
As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?
Question
What is the Net view command and how can you use it?
Question
How does Windows 7 differ from its predecessors?
Question
List at least eight variations of UNIX.
Question
What is Hyena and what can it be used for?
Question
What is enumeration?
Question
What is DumpSec and what can it be used for?
Question
Why is enumeration a more intrusive process than port scanning or footprinting?
Question
Why do hackers pay attention to NetBIOS computer name suffixes?
Question
What can be accomplished by typing "finger root" in *nix systems?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Enumeration
1
The open-source descendant of Nessus is called ____.

A)NW
B)WNessus
C)OpenVAS
D)WinNessus
C
2
Windows 98 introduced the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
B
3
In ____, instead of peer-to-peer networks, a client/server model was created in which a server was responsible for authenticating users and giving them access to resources on a network.

A)Windows 95
B)Windows 98
C)Windows Me
D)Windows NT 3.51
D
4
The ____ command gives you a quick way to see whether there are any shared resources on a computer or server.

A)Nbtstat
B)Net view
C)NetDDE
D)Netmon Agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The enumeration process for Windows Me is the same as for Windows 98.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ implemented Windows File Protection to prevent core system files from being overwritten.

A)Windows 95
B)Windows 98
C)Windows NT 3.51
D)Windows XP Professional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Windows 95 uses the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The most recent version of Novell OS is called ____.

A)NetWare 6.0
B)NetWare 6.5
C)Novell Open Enterprise Server
D)Novell NetWare 4.0 Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
NBTscan is a tool for enumerating Windows OSs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
NetBIOS names have a limit of ____ characters.

A)8
B)12
C)16
D)24
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The computer names you assign to Windows systems are called ____ names.

A)Active Directory
B)NetBIOS
C)NetDDE
D)IIS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The Netmon Agent is a Linux network-monitoring tool.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.

A)open session
B)unauthorized session
C)void session
D)null session
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A NetBIOS name does not need to be unique on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas.

A)IIS
B)Zion
C)NetDDE
D)Hyena
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ is an enhancement to NDS (NetWare Directory Services).

A)Active Directory
B)Bindery
C)X.500
D)eDirectory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Windows NT 3.51 uses the ____ file system.

A)FAT16
B)FAT32
C)NTFS
D)ext3
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a system process that runs on Windows OSs to facilitate the exchange of network data.

A)NetBIOS
B)Active Directory
C)NetDDE
D)IIS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ command is a powerful enumeration tool included with Windows.

A)NessusWX
B)Nbtstat
C)NetDDE
D)Netmon Agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The most popular enumeration tool for security testers and hackers alike is the ____ utility, which enables you to find out who is logged in to a *nix system with one simple command.

A)Whois
B)Finger
C)Ping
D)Who
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
replaced the Registry with Active Directory for object storage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
encompasses four editions; each is targeted to different markets with different features
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system's hardware and software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
developed by Sun Microsystems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Many password-guessing programs are available that can determine a password in a matter of seconds. One such program the Department of Defense uses is ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
developed by contributors and sponsored by Red Hat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
more stable than its predecessor, with an improved file system (FAT32)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
NetWare's ____ is a graphical Java utility for centralized network administration.

A)ConsoleOne
B)Bindery
C)eDirectory
D)Client32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
uses SUSE Linux as its OS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
first Microsoft GUI product that did not rely on DOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
With ____, you can have your desktop computer or laptop start in both Windows and Linux.

A)Grand Unified Bootloader
B)FreeBSD Boot
C)NetWare Connect 5.0
D)Connection Client
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
LDAP (port ____) is the protocol used to access Novell's eDirectory, Microsoft Active Directory, and Apple Open Directory.

A)52
B)89
C)128
D)389
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The "NBT" part of "NBTscan" is an abbreviation for ____________________ over TCP/IP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
_____________________________________________ is a Windows programming interface that allows computers to communicate across a local area network (LAN).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
To determine what resources or shares are on a network, security testers must first determine what _________________________ is being used via port scanning and footprinting.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
domains are emphasized in this OS instead of workgroups
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In NetWare 5.0, TCP/IP replaced ____ as the default protocol.

A)NetBIOS
B)IPX/SPX
C)ATM
D)LDAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
Match each term with the correct statement below.
a.Windows 98
f.Windows XP Professional
b.Windows 95
g.Novell Open Enterprise Server
c.Windows Server 2003
h.Windows 2000 Server/Professional
d.Fedora Linux
i.Windows NT 3.51 Server/Workstation
e.Solaris
the kernel data structures were made read only to prevent rogue applications from affecting the core of the operating system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the Net view command and how can you use it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How does Windows 7 differ from its predecessors?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List at least eight variations of UNIX.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is Hyena and what can it be used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is enumeration?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is DumpSec and what can it be used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Why is enumeration a more intrusive process than port scanning or footprinting?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Why do hackers pay attention to NetBIOS computer name suffixes?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What can be accomplished by typing "finger root" in *nix systems?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.