in Education by
__________ suite is used for NTP enumeration. (a) DNS (b) NTP (c) HTTP (d) SNMP The question was posed to me in class test. This intriguing question comes from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (b) NTP For explanation I would say: NTP Suite is employed for NTP enumeration. This is significant for a network environment; where anyone can discover other primary servers which assist the hosts to update their time, and the entire process can be done without authenticating.

Related questions

0 votes
    Network enumeration is the finding of __________ or devices on a network. (a) hosts (b) servers (c) network ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Enumeration is done to gain information. Which of the following cannot be achieved using enumeration? (a) IP Tables ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Enumeration does not depend on which of the following services? (a) DNS enumeration (b) SNMP enumeration (c) NTP ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    __________ is used for encrypting data at network level. (a) IPSec (b) HTTPS (c) SMTP (d) S/MIME This ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    __________ is a popular tool used for discovering networks as well as in security auditing. (a) Ettercap (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    There are __________ different versions of IP popularly used. (a) 2 (b) 3 (c) 4 (d) 5 I have been asked ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    __________ is the practice implemented to spy someone using technology for gathering sensitive information. (a) Cyber espionage ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. (a) section 65 (b) section ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...