CMIT 265 Quiz 2
- Which password attack exploits situations in which users change their passwords by adding a number to their old password?
- A _________________ is an attempt to simulate methods that intruders use to gain unauthorized access to an organization’s networked systems and then compromise them.
- This type of rootkit transforms calls from the legitimate application to output the attacker’s data instead of the genuine data.
- ____________ is a hardware or software tool for recording keystrokes on a target system.
- If you wanted to steal the password hashes from a Linux system for cracking with a password brute-forcing program, where would you look for the password file?
- ______________ cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.
- In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
- In NTFS, the nature of a file is that it can hold a lot of information, some of which is visible to the operating system but not to the user. This information is called ______________.
- This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).
- Many steganography tools use a technique that lets them hide messages inside image files by overwriting the __________________.
- Which one of the following password hash methods has a 14-character limit?
- What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?
- Where is the password file located on the Windows NT/2000 system?
- Which of the following is not a countermeasure for defending against null-session vulnerabilities?
- ______________ cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.
- ________________ trees illustrate who, when, why, how, and with what probability an attacker might strike a system.
- ________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
- What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
- To prevent null sessions to an NT/2000 system, which TCP and UDP ports must you filter to check null sessions on your network?
- Which of the following relative identifiers (RID) listed below identifies the administrator account on a Windows system?
No comments:
Post a Comment