Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords.

Posted by: Pdfprep Category: ECSAv10 Tags: , ,

Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords.

Identify the enumeration technique.
A . NTP Enumeration
B . NetBIOS Enumeration
C . DNS Enumeration
D . SMTP Enumeration

Answer: B

Leave a Reply

Your email address will not be published.