Certified Ethical Hacker (CEH) Practice Question

During a security debrief you learn that attackers harvested your Windows file-server's user and group lists by establishing a null session to TCP port 445. To stop similar enumeration attempts while keeping normal authenticated SMB file sharing intact, which hardening action should you apply first?

  • Change the server's NetBIOS computer name so it is harder to guess on the network.

  • Increase the DNS record Time-to-Live (TTL) for the server to limit name-resolution requests.

  • Disable or rename the built-in Guest account and set the registry value HKLM\SYSTEM\CurrentControlSet\Control\Lsa"RestrictAnonymous" to 2 (no anonymous enumeration).

  • Re-enable SMBv1 and turn off SMB signing to force legacy clients to use weaker authentication.

Certified Ethical Hacker (CEH)
Reconnaissance Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot