Home
You may like this!
126.
A __________ is a type of offline attack.
  • A.
    Cracking attack
  • B.
    Rainbow attack
  • C.
    Birthday attack
  • D.
    Hashing attack
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A rainbow attack or rainbow table attack is designed to generate the hashes necessary to perform an offline attack against an extracted hash.
Report
Name Email  
127.
An attacker can use a(n) __________ to return to a system.
  • A.
    Backdoor
  • B.
    Cracker
  • C.
    Account
  • D.
    Service
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A backdoor gives an attacker a means to come back to the system later for further attacks.
Report
Name Email  
128.
A __________ is used to represent a password.
  • A.
    NULL session
  • B.
    Hash
  • C.
    Rainbow table
  • D.
    Rootkit
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A password hash is commonly used to represent a password in an encrypted format that is not reversible in locations such as the SAM database.
Report
Name Email  
129.
A __________ is a file used to store passwords.
  • A.
    Network
  • B.
    SAM
  • C.
    Database
  • D.
    NetBIOS
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The SAM database is used to store credential information on a local system.
Report
Name Email  
130.
__________ is a hash used to store passwords in older Windows systems.
  • A.
    LM
  • B.
    SSL
  • C.
    SAM
  • D.
    LMv2
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
LM is a hashing format used to store passwords.
Report
Name Email