Where is the password file located on the Windows NT/2000 system?
Question 1 options:
What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?
Question 2 options:
encrypted session keys
strong hash algorithm
What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
Question 3 options:
They are short.
They are converted to lower case.
They are converted to upper case.
If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters
Previous PageNext Page
In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
Question 5 options:
Which of the following Windows Utilities can be utilized to enumerate hosts?
Question 6 options:
______________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
Management Information Bases (MIBs)
Simple Network Management Protocol
Which of the following Management Information Base (MIB) files contains information about server services :
Question 9 options:
What hidden share can be tested for evidence of null-session vulnerabilities?
Question 10 options:
Network Time Protocol (NTP) enumeration commands include (Choose 3)?
Question 11 options:
Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?
Question 12 options:
It uses the UDP protocol.
It transmits its community string in clear text.
It comes configured by default on all devices.
It cannot be disabled.
The SMTP Protocol provides 3 built in commands, including:
Question 13 options:
Previous PageNext PageThe SMTP Protocol provides 3 built in commands, including:
Question 13 options: