Port Scanning & Network Mapping Quiz 4-INT-268

Port Scanning & Network Mapping Quiz 4-INT-268

Port Scanning & Network Mapping Quiz 4-Question 1

When you log in to the system, you are identified by a user account. In addition to your user account, you might belong to a group or groups.

True

False

Question 2

Scanning hosts for open ports can provide a good indication as to the hosts OS.

True

False

Question 3

SMTP can sometimes be helpful in identifying users. Attackers gain this information by using the SMTP vrfy (verify) and expn (expand) commands

True

False

Question 4

After a system has been scanned and enumerated, the next step is to gain access. Attempts to gain access can occur remotely or locally. Remote attacks are primarily carried out through one of four methods.

True

False

Question 5

Privilege escalation is a type of network attack used to gain unauthorized access to systems within a security perimeter. Attackers start by finding weak points in an organization’s defenses and gaining access to a system.

True

False

Answer Preview-Port Scanning & Network Mapping Quiz 4-INT-268

Port Scanning & Network Mapping Quiz 4-INT-268

$3.00

Posted

in

by

Tags: