Which of the following tools can an attacker use to obtain a SID if he knows the account name?
a. USER2SID
b. SID2USER
c. DumpSec
d. Net view
ANS: A
Computer Science & Information Technology
You might also like to view...
In ActionScript 3.0, the ____ programming concept is described as the types of actions an object performs.
A. event B. function C. methods D. objects
Computer Science & Information Technology
Access is often used as a stand-alone DBMS, meaning a DBMS used by ________ users
Fill in the blank(s) with correct word
Computer Science & Information Technology
Distinguish between static binding and dynamic binding. Explain the use of virtual func- tions and the vtable in dynamic binding.
What will be an ideal response?
Computer Science & Information Technology
Which of these is not a typical definition of privacy found in general dictionaries?
A. seclusion B. secrecy or concealment C. freedom from intrusion D. freedom to own obscene material
Computer Science & Information Technology