Which of the following tools can an attacker use to obtain a SID if he knows the account name?

a. USER2SID
b. SID2USER
c. DumpSec
d. Net view


ANS: A

Computer Science & Information Technology

You might also like to view...

In ActionScript 3.0, the ____ programming concept is described as the types of actions an object performs.

A. event B. function C. methods D. objects

Computer Science & Information Technology

Access is often used as a stand-alone DBMS, meaning a DBMS used by ________ users

Fill in the blank(s) with correct word

Computer Science & Information Technology

Distinguish between static binding and dynamic binding. Explain the use of virtual func- tions and the vtable in dynamic binding.

What will be an ideal response?

Computer Science & Information Technology

Which of these is not a typical definition of privacy found in general dictionaries?

A. seclusion B. secrecy or concealment C. freedom from intrusion D. freedom to own obscene material

Computer Science & Information Technology