Which of the following tools can an attacker use to obtain the account name if he knows the SID?

a. USER2SID
b. SID2USER
c. DumpSec
d. Net view

ANS: B

Computer Science & Information Technology

You might also like to view...

A group of related fields is called a ________

A) record B) table C) query D) hyperlink

Computer Science & Information Technology

A disadvantage of a stacked column chart is that the segments within each column do not start at the same point

Indicate whether the statement is true or false

Computer Science & Information Technology