126.
A __________ is a type of offline attack.
- A.Cracking attack
- B.Rainbow attack
- C.Birthday attack
- D.Hashing attack
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A rainbow attack or rainbow table attack is designed to generate the hashes necessary to perform an offline attack against an extracted hash. |
127.
An attacker can use a(n) __________ to return to a system.
- A.Backdoor
- B.Cracker
- C.Account
- D.Service
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A backdoor gives an attacker a means to come back to the system later for further attacks. |
128.
A __________ is used to represent a password.
- A.NULL session
- B.Hash
- C.Rainbow table
- D.Rootkit
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A password hash is commonly used to represent a password in an encrypted format that is not reversible in locations such as the SAM database. |
129.
A __________ is a file used to store passwords.
- A.Network
- B.SAM
- C.Database
- D.NetBIOS
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The SAM database is used to store credential information on a local system. |
130.
__________ is a hash used to store passwords in older Windows systems.
- A.LM
- B.SSL
- C.SAM
- D.LMv2
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
LM is a hashing format used to store passwords. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40