+
CMIT 321 WEEK 2 QUIZ

CMIT 321 WEEK 2 QUIZ

Rating:
Rating
(0)
Author: Joyce Buda
Description:

http://theperfecthomework.com/cmit-321-week-2-quiz/


Where is the password file located on the Windows NT/2000 system?
Question 1 options:
 
%systemroot%\config

 
%systemroot%\system32\password

 
%systemroot%\system32\SAM.conf

 
%systemroot%\system32\config

 
What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?
Question 2 options:
 
password policies

 
challenge/response

 
encrypted session keys

 
strong hash algorithm

What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
Question 3 options:
 
They are short.

 
They are converted to lower case.

 
They are converted to upper case.

 
If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters

Save
Previous PageNext Page
In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
Question 5 options:
 
hybrid

 
nontechnical

 
rule-based

 
precomputed hashes

Which of the following Windows Utilities can be utilized to enumerate hosts?
Question 6 options:
 
net Use

 
net view

 
net view

 
net stop

______________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
 
Found Scan

 
AppScan

 
CyberCop Scanner

 
Hackshield

SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
 
a) 

Management Information Bases (MIBs)

 
b) 

Simple Network Management Protocol

 
c) 

SNMPUTIL

 
d) 

object identifiers
 
Which of the following Management Information Base (MIB) files contains information about server services :
Question 9 options:
 
DCHP.MIB

 
HOSTMIB.MIB

 
WINS.MIB

 
LNMIB2.MIB

What hidden share can be tested for evidence of null-session vulnerabilities?
Question 10 options:
 
ADMIN$

 
NULL$

 
C$

 
IPC$

Network Time Protocol (NTP) enumeration commands include (Choose 3)?
Question 11 options:
 
Net time

 
ntpdate

 
ntptrace

 
ntpq

Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?
Question 12 options:
 
It uses the UDP protocol.

 
It transmits its community string in clear text.

 
It comes configured by default on all devices.

 
It cannot be disabled.

The SMTP Protocol provides 3 built in commands, including:
Question 13 options:
 
VRFY

 
EXPN

 
RCPT TO

 
FINGER

Save
Previous PageNext PageThe SMTP Protocol provides 3 built in commands, including:
Question 13 options:
 
VRFY

 
EXPN

 
RCPT TO

 
FINGER

Save
Previous PageNext Page

This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).
Question 20 options:
 
DumpSec

 
Net View

 
Nbtstat

 
enum

Save
Previous PageNext Page
________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
 
Found Scan

 
AppScan

 
CyberCop Scanner

 
HackshieldSNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:


(more)
See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

25 Sophia partners guarantee credit transfer.

221 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 20 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.

Tutorial