Monday, December 26, 2016

CMIT 265 Fundamentals of Networking Quiz 2 Answers – Homeworkmade


CMIT 265 Quiz 2

  1. Which password attack exploits situations in which users change their passwords by adding a number to their old password?
  2. A _________________ is an attempt to simulate methods that intruders use to gain unauthorized access to an organization’s networked systems and then compromise them.
  3. This type of rootkit transforms calls from the legitimate application to output the attacker’s data instead of the genuine data.
  4. ____________ is a hardware or software tool for recording keystrokes on a target system.
  5. If you wanted to steal the password hashes from a Linux system for cracking with a password brute-forcing program, where would you look for the password file?
  6. ______________ cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.
  7. In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
  8. In NTFS, the nature of a file is that it can hold a lot of information, some of which is visible to the operating system but not to the user. This information is called ______________.
  9. This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).
  10. Many steganography tools use a technique that lets them hide messages inside image files by overwriting the __________________.
  11. Which one of the following password hash methods has a 14-character limit?
  12. What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?
  13. Where is the password file located on the Windows NT/2000 system?
  14. Which of the following is not a countermeasure for defending against null-session vulnerabilities?
  15. ______________ cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.
  16. ________________ trees illustrate who, when, why, how, and with what probability an attacker might strike a system.
  17. ________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
  18. What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
  19. To prevent null sessions to an NT/2000 system, which TCP and UDP ports must you filter to check null sessions on your network?
  20. Which of the following relative identifiers (RID) listed below identifies the administrator account on a Windows system?

No comments:

Post a Comment