- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
l Gathering information
l Determining the network range
l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Correct Answer:
B
- (Topic 3)
You have changed the RestrictAnonymous registry setting from 0 to 1 on your servers to secure your Windows 2000 system so that any malicious user cannot establish a null session on the server. However, when you test the security using userinfo tool, you got that you can still establish the null session. What may be its reason?
Correct Answer:
C
- (Topic 4)
Which of the following statements about SSID is NOT true?
Correct Answer:
A
- (Topic 4)
Which of the following tools can be used to find a username from a SID?
Correct Answer:
C
- (Topic 3)
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?
Correct Answer:
A