Port Scanning & Network Mapping Quiz 4-Question 1
When you log in to the system, you are identified by a user account. In addition to your user account, you might belong to a group or groups.
True
False
Question 2
Scanning hosts for open ports can provide a good indication as to the hosts OS.
True
False
Question 3
SMTP can sometimes be helpful in identifying users. Attackers gain this information by using the SMTP vrfy (verify) and expn (expand) commands
True
False
Question 4
After a system has been scanned and enumerated, the next step is to gain access. Attempts to gain access can occur remotely or locally. Remote attacks are primarily carried out through one of four methods.
True
False
Question 5
Privilege escalation is a type of network attack used to gain unauthorized access to systems within a security perimeter. Attackers start by finding weak points in an organization’s defenses and gaining access to a system.
True
False