Test Bank For Hands On Ethical Hacking and Network Defense 2nd Edition

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Test Bank for Hands-On Ethical Hacking and Network Defense, 2nd Edition

Test Bank for Hands-On Ethical Hacking and


Network Defense, 2nd Edition

To download the complete and accurate content document, go to:


https://testbankbell.com/download/test-bank-for-hands-on-ethical-hacking-and-networ
k-defense-2nd-edition/

Visit TestBankBell.com to get complete for all chapters


Chapter 6: Enumeration

TRUE/FALSE

1. NBTscan is a tool for enumerating Windows OSs.

ANS: T PTS: 1 REF: 132

2. The enumeration process for Windows Me is the same as for Windows 98.

ANS: T PTS: 1 REF: 134

3. NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating
security in these file systems.

ANS: T PTS: 1 REF: 134

4. A NetBIOS name does not need to be unique on a network.

ANS: F PTS: 1 REF: 135

5. The Netmon Agent is a Linux network-monitoring tool.

ANS: F PTS: 1 REF: 136

MULTIPLE CHOICE

1. Windows 95 uses the ____ file system.


a. FAT16 c. NTFS
b. FAT32 d. ext3
ANS: A PTS: 1 REF: 134

2. Windows 98 introduced the ____ file system.


a. FAT16 c. NTFS
b. FAT32 d. ext3
ANS: B PTS: 1 REF: 134

3. In ____, instead of peer-to-peer networks, a client/server model was created in which a server was
responsible for authenticating users and giving them access to resources on a network.
a. Windows 95 c. Windows Me
b. Windows 98 d. Windows NT 3.51
ANS: D PTS: 1 REF: 134

4. Windows NT 3.51 uses the ____ file system.


a. FAT16 c. NTFS
b. FAT32 d. ext3
ANS: C PTS: 1 REF: 134

5. ____ implemented Windows File Protection to prevent core system files from being overwritten.
a. Windows 95 c. Windows NT 3.51
b. Windows 98 d. Windows XP Professional
ANS: D PTS: 1 REF: 134

6. The computer names you assign to Windows systems are called ____ names.
a. Active Directory c. NetDDE
b. NetBIOS d. IIS
ANS: B PTS: 1 REF: 135

7. NetBIOS names have a limit of ____ characters.


a. 8 c. 16
b. 12 d. 24
ANS: C PTS: 1 REF: 135

8. ____ is a system process that runs on Windows OSs to facilitate the exchange of network data.
a. NetBIOS c. NetDDE
b. Active Directory d. IIS
ANS: C PTS: 1 REF: 136

9. One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated
connection to a Windows computer using no logon and password values.
a. open session c. void session
b. unauthorized session d. null session
ANS: D PTS: 1 REF: 137

10. The ____ command is a powerful enumeration tool included with Windows.
a. NessusWX c. NetDDE
b. Nbtstat d. Netmon Agent
ANS: B PTS: 1 REF: 137

11. The ____ command gives you a quick way to see whether there are any shared resources on a
computer or server.
a. Nbtstat c. NetDDE
b. Net view d. Netmon Agent
ANS: B PTS: 1 REF: 137

12. ____ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical
representations of several areas.
a. IIS c. NetDDE
b. Zion d. Hyena
ANS: D PTS: 1 REF: 142

13. The open-source descendant of Nessus is called ____.


a. NW c. OpenVAS
b. WNessus d. WinNessus
ANS: C PTS: 1 REF: 142

14. The most recent version of Novell OS is called ____.


a. NetWare 6.0 c. Novell Open Enterprise Server
b. NetWare 6.5 d. Novell NetWare 4.0 Server
ANS: C PTS: 1 REF: 150

15. ____ is an enhancement to NDS (NetWare Directory Services).


a. Active Directory c. X.500
b. Bindery d. eDirectory
ANS: D PTS: 1 REF: 150

16. NetWare’s ____ is a graphical Java utility for centralized network administration.
a. ConsoleOne c. eDirectory
b. Bindery d. Client32
ANS: A PTS: 1 REF: 150

17. In NetWare 5.0, TCP/IP replaced ____ as the default protocol.


a. NetBIOS c. ATM
b. IPX/SPX d. LDAP
ANS: B PTS: 1 REF: 150

18. LDAP (port ____) is the protocol used to access Novell’s eDirectory, Microsoft Active Directory, and
Apple Open Directory.
a. 52 c. 128
b. 89 d. 389
ANS: D PTS: 1 REF: 151

19. The most popular enumeration tool for security testers and hackers alike is the ____ utility, which
enables you to find out who is logged in to a *nix system with one simple command.
a. Whois c. Ping
b. Finger d. Who
ANS: B PTS: 1 REF: 157

20. With ____, you can have your desktop computer or laptop start in both Windows and Linux.
a. Grand Unified Bootloader c. NetWare Connect 5.0
b. FreeBSD Boot d. Connection Client
ANS: A PTS: 1 REF: 157

COMPLETION

1. To determine what resources or shares are on a network, security testers must first determine what
_________________________ is being used via port scanning and footprinting.

ANS:
OS
operating system
operating system (OS)

PTS: 1 REF: 132


2. The “NBT” part of “NBTscan” is an abbreviation for ____________________ over TCP/IP.

ANS: NetBIOS

PTS: 1 REF: 132

3. Probably the biggest enhancement in Windows 95 was the ____________________, a database that
stores information about the system’s hardware and software.

ANS: Registry

PTS: 1 REF: 134

4. _____________________________________________ is a Windows programming interface that


allows computers to communicate across a local area network (LAN).

ANS:
NetBIOS
Network Basic Input Output System
Network Basic Input Output System (NetBIOS)
NetBIOS (Network Basic Input Output System)

PTS: 1 REF: 135

5. Many password-guessing programs are available that can determine a password in a matter of seconds.
One such program the Department of Defense uses is ____________________.

ANS: L0phtcrack

PTS: 1 REF: 138

6. Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.

ANS: NetWare

PTS: 1 REF: 148

MATCHING

Match each term with the correct statement below.


a. Windows 98 f. Windows XP Professional
b. Windows 95 g. Novell Open Enterprise Server
c. Windows Server 2003 h. Windows 2000 Server/Professional
d. Fedora Linux i. Windows NT 3.51 Server/Workstation
e. Solaris
1. first Microsoft GUI product that did not rely on DOS
2. more stable than its predecessor, with an improved file system (FAT32)
3. domains are emphasized in this OS instead of workgroups
4. replaced the Registry with Active Directory for object storage
5. the kernel data structures were made read only to prevent rogue applications from affecting the core of
the operating system
6. encompasses four editions; each is targeted to different markets with different features
7. uses SUSE Linux as its OS
8. developed by Sun Microsystems
9. developed by contributors and sponsored by Red Hat

1. ANS: B PTS: 1 REF: 134


2. ANS: A PTS: 1 REF: 134
3. ANS: I PTS: 1 REF: 134
4. ANS: H PTS: 1 REF: 134
5. ANS: F PTS: 1 REF: 134
6. ANS: C PTS: 1 REF: 134
7. ANS: G PTS: 1 REF: 150
8. ANS: E PTS: 1 REF: 156
9. ANS: D PTS: 1 REF: 157

SHORT ANSWER

1. What is enumeration?

ANS:
Enumeration is the process of extracting the following information from a network:
- Resources or shares on the network
- User names or groups assigned on the network
- Users’ passwords and recent logon times

PTS: 1 REF: 132

2. Why is enumeration a more intrusive process than port scanning or footprinting?

ANS:
Enumeration is more intrusive because you’re not just identifying a resource; you’re attempting to
access it. It goes beyond passive scanning of a network to find open ports. Sometimes this process
entails guessing passwords after determining a user name.

PTS: 1 REF: 132

3. How does Windows 7 differ from its predecessors?

ANS:
Windows 7 has an optional Windows XP Mode (XPM) that allows running older applications in a
virtual Windows XP environment, because software incompatibility issues have prevented many
companies from upgrading from Windows XP. However, XPM requires late-model processors that
support virtualization extensions, and upgrading to Windows 7 from XP requires a complete
reinstallation. Other improvements include faster startup, better overall performance, and refinements
to the UAC feature, the desktop/taskbar user interface, and integration of peripheral devices.

PTS: 1 REF: 135

4. Why do hackers pay attention to NetBIOS computer name suffixes?

ANS:
The NetBIOS name suffixes correspond to the services, or resource types, running on a computer. You
don’t need to memorize all the suffixes, but several are critical because they identify the computer or
server being enumerated as a standalone computer or a domain controller. Hackers often exert more
effort attacking computers identified as domain controllers because they can offer more information,
including logon names for user accounts and network resources.

PTS: 1 REF: 135

5. What is the Net view command and how can you use it?

ANS:
The Net view command is a built-in Windows tool that gives you a quick way to see whether there are
any shared resources on a computer or server. To see the syntax for this command, type net view ? at
the command prompt.

PTS: 1 REF: 137

6. What is DumpSec and what can it be used for?

ANS:
DumpSec is a popular enumeration tool for Windows systems. The information you can gather with
this tool is astonishing. For example, after connecting to a Windows server, you can download—or, as
it’s called in DumpSec, “dump”—the following information:
- Permissions for shares
- Permissions for printers
- Permissions for the Registry
- Users in column or table format
- Policies (such as local, domain, or group policies)
- Rights
- Services

PTS: 1 REF: 141

7. What is Hyena and what can it be used for?

ANS:
Hyena is an excellent GUI product for managing and securing Microsoft OSs. The interface is easy to
use and gives security professionals a wealth of information. With just a click,you can look at the
shares and user logon names for Windows servers and domain controllers. If any domains or
workgroups are on the network, this tool displays them, too. Hyena can also display a graphical
representation of the following areas:
- Microsoft Terminal Services
- Microsoft Windows Network
- Web Client Network
- Find User/Group

PTS: 1 REF: 142

8. As a security professional, should you learn about the security issues in the NetWare OS? Why or why
not?

ANS:
Test Bank for Hands-On Ethical Hacking and Network Defense, 2nd Edition

Many security professionals assume that knowledge of just one operating system is enough, but
focusing on Windows and ignoring *nix systems—or vice versa—can limit your career as a security
professional. Similarly, some security professionals see Novell NetWare as a “dead” OS, but many
corporations still rely on their faithful NetWare servers that keep plugging away.

PTS: 1 REF: 149

9. List at least eight variations of UNIX.

ANS:
Here are some variations of UNIX: Solaris, OpenSolaris, HP-UX, Mac OS X, AIX, BSD UNIX,
FreeBSD, OpenBSD, NetBSD, Linux, Ubuntu, Red Hat Enterprise Linux, Fedora Linux, Debian
Linux, SUSE Linux, OpenSUSE, Mandriva Linux, and Slackware.

PTS: 1 REF: 156-157

10. What can be accomplished by typing “finger root” in *nix systems?

ANS:
The output displays the logon name, the directory in which the root account is currently located, the
shell being used, and the date the root account logged on to the system.

PTS: 1 REF: 158

Visit TestBankBell.com to get complete for all chapters

You might also like