1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
13

Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy

stem.
Which of the following enumeration an attacker uses to obtain list of computers that belongs to a domain?
a. Netbios enumeration
b. SNMP enumeration
c. NTP enumeration
d. SMTP enumeration
Computers and Technology
1 answer:
katrin [286]3 years ago
6 0

Answer: a) Netbios enumeration

Explanation:  Netbios enumeration(Network Basic Input Output System) is accessed by the hacker/ attackers for gaining the information about the network domain,computer device and other data.It can maintain the network over a local area network (LAN)  for the sharing of the files , data and other resources. It can work for the identification of the computer network on the Windows.

Therefore, the correct option is option(a).

You might be interested in
Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
nirvana33 [79]

Answer:

SO-DIMM DDR3

Explanation:

Based on the information provided within the question it can be said that the module that Jenny needs to order is known as SO-DIMM DDR3. This is the type of module that would work on her laptop computer. DDR3 is the most common generation of these RAM modules and SO-DIMM are rams that support 72, 100, 144, or 204 pins and is alot smaller than regular DIMM modules, coming in at about 3 inches.

8 0
3 years ago
What phobia is a fear of computers or working on a computer?
aleksandr82 [10.1K]
Cyberphobia is a fear of computers
7 0
3 years ago
Which of the following assumes that the repair will happen just as the technician stated?
kipiarov [429]
A (filling out carachts
3 0
3 years ago
Why now days 3D images are used in cartoons? What are the drawbacks of 2D image?
antoniya [11.8K]

Answer:

There are no drawbacks

Explanation:

People just think 3D is more modern-ish. I liked 2D better, but whatever- things are changing.

5 0
3 years ago
Read 2 more answers
Documents stored on the world wide web are written and linked together using
FrozenT [24]
Using the hypertext transfer protocol
3 0
3 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for e
    13·1 answer
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • Consider the following arrays. 1 4 21 2 4 100 B # 111(A) L3π 42 Write MATLAB expressions to do the tollowing a. Select just the
    13·1 answer
  • 15. A mechanism by which other modules, such as I/O and memory, may interrupt the normal sequencing of the processor is called (
    13·1 answer
  • Hi hehehehehehehehehheeheh<br>​
    10·1 answer
  • How do a router and switch differ when handling a message? Both a router and a switch use the message’s destination address to s
    10·1 answer
  • What determines the number of times that a condition-controlled loop will repeat?
    9·2 answers
  • Refer to the exhibit. What kind of NAT is configured on the ASA device?
    10·1 answer
  • What was your first pokemon game<br><br><br> if you have not played one just comment don't answer
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!