1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
13

Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy

stem.
Which of the following enumeration an attacker uses to obtain list of computers that belongs to a domain?
a. Netbios enumeration
b. SNMP enumeration
c. NTP enumeration
d. SMTP enumeration
Computers and Technology
1 answer:
katrin [286]3 years ago
6 0

Answer: a) Netbios enumeration

Explanation:  Netbios enumeration(Network Basic Input Output System) is accessed by the hacker/ attackers for gaining the information about the network domain,computer device and other data.It can maintain the network over a local area network (LAN)  for the sharing of the files , data and other resources. It can work for the identification of the computer network on the Windows.

Therefore, the correct option is option(a).

You might be interested in
Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
Svet_ta [14]
Data, it can only be data.
5 0
3 years ago
Why have countries requested for the removal of content?
Kipish [7]
These links should help u:
https://support.google.com/transparencyreport/answer/7347744?hl=en

https://searchengineland.com/most-censorship-and-content-takedown-requests-come-from-us-says-google-...
5 0
3 years ago
Someone, please answer this.
Sav [38]

Answer: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too. statement - Code to be repeated in the loop.

Explanation:

7 0
3 years ago
PLEASE HELP THANK YOU
Andrei [34K]

Answer:

1) A string is "non-numeric data".  In other words, it is text.

2) False, a runtime error means that there is a problem, but it will be with the software, not the hardware.

3) An impossible task such as dividing five by zero is a logical error.  Not using quotes on a string would be a syntax error, printing an inaccurate statement is not an error at all (as far as the program is concerned anyway), and using camelcase on a variable with multiple words is a common convention.

4) variableName = "value"

5) The code provided here is illegible, so I can't give a straight answer. It seems to be missing operators.

6 0
3 years ago
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
tatiyna

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

7 0
2 years ago
Other questions:
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Do you think that feedly will help you create an effective personal online learning environment? Why or why not?
    15·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • Java Eclipse homework. I need help coding this
    6·1 answer
  • Who wants brainliest? First to answer gets it....
    12·2 answers
  • If one of the resistors is turned off (I.e. , a light bulb goes out), what happens to the other resistors (light bulbs) in the c
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!