Security testers conduct enumeration for which of the following reasons? (Choose all that apply.)
a. Gaining access to shares and network resources
b. Obtaining user logon names and group memberships
c. Discovering services running on computers and servers
d. Discovering open ports on computers and servers
Answer:
a. Gaining access to shares and network resources
b. Obtaining user logon names and group memberships
Computer Science & Information Technology
You might also like to view...
A query that can evaluate trends over a period of time by placing data in a grid is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
_________________________ are the defects in various programming languages that are used to develop server-side and client-side applications.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology