Click link for more description
Where is the password file located on the Windows NT/2000 system?
Question 1 options:
What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?
Question 2 options:
encrypted session keys
strong hash algorithm
What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
Question 3 options:
They are short.
They are converted to lower case.
They are converted to upper case.
If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters
Previous PageNext Page
In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
Question 5 options:
Which of the following Windows Utilities can be utilized to enumerate hosts?