Spring Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

While reviewing exposed infrastructure for a logistics company in Denver, Joe, a security analyst, identifies...

While reviewing exposed infrastructure for a logistics company in Denver, Joe, a security analyst, identifies that one host is synchronizing time using UDP port 123. Probing further, he issues queries to extract details about peers, offsets, and delays. This allows him to gather internal hostnames and client IP addresses connected to the time server. Such information leakage could provide insight into the company's internal network structure.

Which technique was most likely used to obtain this information?

A.

DNS Zone Transfer Enumeration

B.

NTP Enumeration

C.

VoIP Enumeration

D.

NetBIOS Enumeration

312-50v13 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now 312-50v13 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"