Enumeration

Extracting detailed system information.

5 minutes 5 Questions

Enumeration is a critical phase in the ethical hacking process that follows footprinting and scanning. During enumeration, an ethical hacker methodically collects specific information about target systems, networks, and resources. This phase involves active connections to systems to extract detaile…

Test mode:
CEH - Enumeration Example Questions

Test your knowledge of Enumeration

Question 1

During a NetBIOS enumeration attack, which of the following NetBIOS codes would an attacker specifically look for to identify the domain controller in a Windows network?

Question 2

Which enumeration technique is commonly used to gather information about NetBIOS names, shares, and users on Windows systems?

Question 3

During enumeration against a target with Netstat, you notice numerous established connections on TCP port 445. What service is most likely running on this port that would be valuable for further enumeration?

More Enumeration questions
119 questions (total)