Which of the following tools can an attacker use to obtain the account name if he knows the SID?
a. USER2SID
b. SID2USER
c. DumpSec
d. Net view
ANS: B
Computer Science & Information Technology
You might also like to view...
A group of related fields is called a ________
A) record B) table C) query D) hyperlink
Computer Science & Information Technology
A disadvantage of a stacked column chart is that the segments within each column do not start at the same point
Indicate whether the statement is true or false
Computer Science & Information Technology