CH 6 - Enumeration Flashcards

1
Q

What are RPCs primarily used for?

A. Interprocess communications
B. Interprocess semaphores
C. Remote method invocation
D. Process demand paging

A

A.
Interprocess communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What would you be trying to enumerate if you were to use enum4linux?

A. Procedures
B. Linux-based services
C. Shares and/or users
D. Memory utilization

A

C.
Shares and/or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you authenticate with SNMPv1?

A. Username / password
B. Hash
C. Public string
D. Community string

A

D.
Community string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What SMTP command would you use to get the list of users in a mailing list?

A. EXPD
B. VRFY
C. EXPN
D. VRML

A

C.
EXPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of enumeration would you use the utility dirb for?

A. Directory listings
B. Directory enumeration
C. Brute-force dialing
D. User directory analysis

A

B.
Directory enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are data descriptions in SNMP called?

A. Management‐based information
B. Data structure definition
C. Extensible markup language
D. Management information base

A

D.
Management information base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the process Java programs identify themselves to if they are sharing procedures over the network?

A. RMI registry
B. RMI mapper
C. RMI database
D. RMI process

A

A.
RMI registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are working with a colleague, and you see them interacting with an email server using the VRFY command. What is it your colleague is doing?

A. Verifying SMTP commands
B. Verifying mailing lists
C. Verifying email addresses
D. Verifying the server config

A

C.
Verifying email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the SMB Protocol used for?

A. Data transfers using NFS
B. Data transfers on Windows systems
C. Data transfers for email attachments
D. Data transfers for Windows Registry updates

A

B.
Data transfers on Windows systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is a built‐in program on Windows for gathering information using SMB?

A. nmblookup
B. smbclient
C. Metasploit
D. nbtstat

A

D.
nbtstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What status code will you get if your attempt to use the VRFY command fails?

A. 550
B. 501
C. 250
D. 200

A

A.
550

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What program would you use to enumerate services?

A. smbclient
B. nmap
C. enum4linux
D. snmpwalk

A

B.
nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which version of SNMP introduced encryption and user‐based authentication?

A. 1
B. 2
C. 2c
D. 3

A

D.
3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these could you enumerate on a WordPress site using wpscan?

A. Plugins
B. Posts
C. Administrators
D. Versions

A

A.
Plugins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these tools allows you to create your own enumeration function based on ports being identified as open?

A. Metasploit
B. nmap
C. Netcat
D. nbtstat

A

B.
nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What underlying functionality is necessary to enable Windows file sharing?

A. Network File System
B. Common Internet File System
C. Remote Procedure call
D. Remote method invocation

A

C.
Remote Procedure call

17
Q

What is the IPC$ share used for?

A. Process piping
B. Interprocess construction
C. Remote process management
D. Interprocess communication

A

D.
Interprocess communication

18
Q

What tool does a Java program need to use to implement remote process communication?

A. JRE
B. rmic
C. rmir
D. JDK

A

B.
rmic

19
Q

Which of these passes objects between systems?

A. SunRPC
B. SMB
C. RMI
D. nmap

A

C.
RMI

20
Q

If you needed to enumerate data across multiple services and also store the data for retrieval later, what tool would you use?

A. Metasploit
B. nmap
C. RMI
D. Postgres

A

A.
Metasploit

21
Q

Which SMTP command would be easiest to disable to prevent attackers from misusing it for enumeration?

A. MAIL FROM
B. RCPT TO
C. DATA
D. VRFY

A

D.
VRFY

22
Q

Which version of SNMP should network administrators be running?

A. V1
B. V2
C. V3
D. V4

A

C.
V3

23
Q

Which of these is not a way to protect against enumeration with SMB?

A. Implement the latest NetBIOS patches
B. Disable SMB
C. Use network firewalls
D. Disable sharing

A

A.
Implement the latest NetBIOS patches

24
Q

Which Metasploit module would you use to take advantage of potentially weaker permissions on an end user’s workstation?

A

D.
auxiliary / scanner / smb / smb_enumshares

25
Q

Which security technology could you use to protect against enumeration on services?

A. Intrusion detection system (IDS)
B. Host‐based firewall
C. Endpoint Detection and Response (EDR)
D. Anti‐malware

A

B.
Host‐based firewall