The process of extracting usernames, machine names, network resources, shares, and services from a system or network is called ________.
A. networking
B. footprinting
C. enumeration
D. forensics
Answer: C. enumeration
You might also like to view...
An advantage of using inheritance with exceptions is:
a. The ability to catch related errors easily. b. Allowing catch statements to be imported into classes. c. The ability to explicitly test for derived class objects individually. d. The simplification of destructor calls for objects.
This is a staged computer system or environment that is specifically set up with security vulnerabilities open for attacks. It is used to gain information about the attacks and sometimes can draw the attacks away from a real critical system.
What will be an ideal response?
An administrator has a drive working properly under Linux and moves it to a Windows server. Which of the following should be performed to ensure Windows can read the disk?
A. Format the drive with ext2. B. Format the drive with ext4. C. Format the drive with NTFS. D. Format the drive with UFS.
Which form object is most commonly used?
A. Radio button B. Check box C. Text field D. List