What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall i
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.
what conditions does a secondary name server request a zone transfer from a primary name server?
Under what conditions does a secondary name server request a zone transfer from a primary name server?
Which of the following tools can be used to perform a zone transfer?
Which of the following tools can be used to perform a zone transfer?
MX record priority increases as the number increases.(True/False.
MX record priority increases as the number increases.(True/False.
What is the version?
One of your team members has asked you to analyze the following SOA record. What is the version?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600
3600 604800 2400.
What is the TTL?
One of your team members has asked you to analyze the following SOA record. What is the TTL?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600
3600 604800 2400.
What is the proper response for a NULL scan if the port is closed?
What is the proper response for a NULL scan if the port is closed?
What is the following command used for?
What is the following command used for?
net use targetipc$ "" /u:""
Here is the output of the SIDs:
Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:
s-1-5-21-1125394485-807628933-54978560-100Johns
s-1-5-21-1125394485-807628933-54978560-652Rebecca
s-1-5-21-1125394485-807628933-54978560-412Sheela
s-1-5-21-1125394485-807628933-54978560-999Shawn
s-1-5-21-1125394485-807628933-54978560-777Somia
s-1-5-21-1125394485-807628933-54978560-500chang
s-1-5-21-1125394485-807628933-54978560-555Micah
From the above list identify the user account with System Administrator privileges.
Which of the following features makes this possible?
SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.
Which of the following features makes this possible? (Choose two)