in Education by
___________ is used that tries for guessing the usernames by using SMTP service. (a) smtp-user-enum (b) smtp-enum (c) snmp-enum (d) snmp-user-enum This question was addressed to me in my homework. This intriguing question originated from Enumerating in Cyber Security in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (a) smtp-user-enum Best explanation: SNMP-user-enum is used that tries to guess the usernames by using SMTP service. Using this, an attacker can examine and establish the usernames that are present in a target host.

Related questions

0 votes
    Which of the following is the port number for SMTP service? (a) 29 (b) 27 (c) 25 (d) 23 This question ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim's ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________________ can be alternatively termed as password guessing attack. (a) passive online (b) active online ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    A _____________ takes executable file as input and tries to generate high level code. (a) Debugger (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ___________ is a weakness that can be exploited by attackers. (a) System with Virus (b) System without firewall ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Why it is important to know which service is using which port number? (a) For database security (b) For ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ___________ are used which crawl web pages looking for email Ids and copies them to the database. (a) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ___________ is a special form of attack using which hackers' exploit - human psychology. (a) Cross Site Scripting ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...