Sam was asked to conduct penetration tests on one of the client’s internal networks. As part of the testing process, Sam performed enumeration to gain information about computers belonging to a domain, list of shares on the individual hosts in the network, policies and passwords.
Identify the enumeration technique.
A . NTP Enumeration
B . NetBIOS Enumeration
C . DNS Enumeration
D . SMTP Enumeration
Answer: B