CH 6 - Enumeration Flashcards
What are RPCs primarily used for?
A. Interprocess communications
B. Interprocess semaphores
C. Remote method invocation
D. Process demand paging
A.
Interprocess communications
What would you be trying to enumerate if you were to use enum4linux?
A. Procedures
B. Linux-based services
C. Shares and/or users
D. Memory utilization
C.
Shares and/or users
How do you authenticate with SNMPv1?
A. Username / password
B. Hash
C. Public string
D. Community string
D.
Community string
What SMTP command would you use to get the list of users in a mailing list?
A. EXPD
B. VRFY
C. EXPN
D. VRML
C.
EXPN
What type of enumeration would you use the utility dirb for?
A. Directory listings
B. Directory enumeration
C. Brute-force dialing
D. User directory analysis
B.
Directory enumeration
What are data descriptions in SNMP called?
A. Management‐based information
B. Data structure definition
C. Extensible markup language
D. Management information base
D.
Management information base
What is the process Java programs identify themselves to if they are sharing procedures over the network?
A. RMI registry
B. RMI mapper
C. RMI database
D. RMI process
A.
RMI registry
You are working with a colleague, and you see them interacting with an email server using the VRFY command. What is it your colleague is doing?
A. Verifying SMTP commands
B. Verifying mailing lists
C. Verifying email addresses
D. Verifying the server config
C.
Verifying email addresses
What is the SMB Protocol used for?
A. Data transfers using NFS
B. Data transfers on Windows systems
C. Data transfers for email attachments
D. Data transfers for Windows Registry updates
B.
Data transfers on Windows systems
Which of these is a built‐in program on Windows for gathering information using SMB?
A. nmblookup
B. smbclient
C. Metasploit
D. nbtstat
D.
nbtstat
What status code will you get if your attempt to use the VRFY command fails?
A. 550
B. 501
C. 250
D. 200
A.
550
What program would you use to enumerate services?
A. smbclient
B. nmap
C. enum4linux
D. snmpwalk
B.
nmap
Which version of SNMP introduced encryption and user‐based authentication?
A. 1
B. 2
C. 2c
D. 3
D.
3
Which of these could you enumerate on a WordPress site using wpscan?
A. Plugins
B. Posts
C. Administrators
D. Versions
A.
Plugins
Which of these tools allows you to create your own enumeration function based on ports being identified as open?
A. Metasploit
B. nmap
C. Netcat
D. nbtstat
B.
nmap
What underlying functionality is necessary to enable Windows file sharing?
A. Network File System
B. Common Internet File System
C. Remote Procedure call
D. Remote method invocation
C.
Remote Procedure call
What is the IPC$ share used for?
A. Process piping
B. Interprocess construction
C. Remote process management
D. Interprocess communication
D.
Interprocess communication
What tool does a Java program need to use to implement remote process communication?
A. JRE
B. rmic
C. rmir
D. JDK
B.
rmic
Which of these passes objects between systems?
A. SunRPC
B. SMB
C. RMI
D. nmap
C.
RMI
If you needed to enumerate data across multiple services and also store the data for retrieval later, what tool would you use?
A. Metasploit
B. nmap
C. RMI
D. Postgres
A.
Metasploit
Which SMTP command would be easiest to disable to prevent attackers from misusing it for enumeration?
A. MAIL FROM
B. RCPT TO
C. DATA
D. VRFY
D.
VRFY
Which version of SNMP should network administrators be running?
A. V1
B. V2
C. V3
D. V4
C.
V3
Which of these is not a way to protect against enumeration with SMB?
A. Implement the latest NetBIOS patches
B. Disable SMB
C. Use network firewalls
D. Disable sharing
A.
Implement the latest NetBIOS patches
Which Metasploit module would you use to take advantage of potentially weaker permissions on an end user’s workstation?
D.
auxiliary / scanner / smb / smb_enumshares
Which security technology could you use to protect against enumeration on services?
A. Intrusion detection system (IDS)
B. Host‐based firewall
C. Endpoint Detection and Response (EDR)
D. Anti‐malware
B.
Host‐based firewall