Security testers conduct enumeration for which of the following reasons? (Choose all that apply.)

a. Gaining access to shares and network resources
b. Obtaining user logon names and group memberships
c. Discovering services running on computers and servers
d. Discovering open ports on computers and servers

Answer:
a. Gaining access to shares and network resources
b. Obtaining user logon names and group memberships

Computer Science & Information Technology

You might also like to view...

A query that can evaluate trends over a period of time by placing data in a grid is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology