Certified Ethical Hacker (CEHv9) Questions and answers
65. Using Windows CMD, how could an attacker list all the shares to which the current user context has access?
A. NET VIEW
B. NET CONFIG
C. NET FILE
D. NET USE
66. Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?
B. John the Ripper
< Prev.Page             CEHv9 Home             Next page>