MODULE 4: Enumeration Flashcards

1
Q

What term involves an attacker creating active connections with a target system and performing directed queries to gain more information about the target?

(CONDUCTED IN AN INTRANET ENVIRONMENT)

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Extracting usernames using email IDs, brute forcing active directory, extracting user groups from windows, extracting info using default passwords, extracting information using DNS zone transfers, and extracting usernames using SNMP are all examples of what?

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol monitors and manages network devices such as routers or switches and is used to modify the device configs and has network devices report back to the central network management system? (NMS)

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the vulnerability of early SNMP?

A

It passed clear-text passwords over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which version of SNMP finally encrypted username/passwords in order to patch the main vulnerability of SNMP?

a. SNMPv1
b. SNMPv2
c. SNMPv3
d. SNMPv4

A

c. SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What NTP tool traces a chain of NTP servers back to the primary source?

A

ntptrace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly