CEH: Ch. 7

Wyjście

Pytanie 1 of 1

  Pozostały Czas


0 [{"id":413221,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"How is a brute-force attack performed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"Brute-force attacks are carried out by trying all possible combinations of characters in an attempt to uncover the correct one.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413227,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"__________ is used to partially encrypt the SAM.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"SYSKEY is used to partially encrypt the SAM database in Windows versions from NT 4 onward.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413225,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"A __________ is a file used to store passwords.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"The SAM database is used to store credential information on a local system.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413220,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"__________ is the process of exploiting services on a system.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"System hacking is intended to increase access to a system.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413229,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"NTLM provides what benefit versus LM?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"NTLM is a more secure protocol than LM. A little stronger still is NTLMv2, which provides additional features such as mutual authentication and stronger encryption.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413228,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"Which system should be used instead of LM or NTLM?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"Kerberos is the authentication mechanism preferred over LM and NTLM (all versions).","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413222,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"A __________ is a type of offline attack.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"A rainbow attack or rainbow table attack is designed to generate the hashes necessary to perform an offline attack against an extracted hash.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413223,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"An attacker can use a(n) __________ to return to a system.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"A backdoor gives an attacker a means to come back to the system later for further attacks.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413226,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"__________ is a hash used to store passwords in older Windows systems.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"LM is a hashing format used to store passwords.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413217,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"Enumeration is useful to system hacking because it provides __________.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"Usernames are especially useful in the system-hacking process because they let you target accounts for password cracking. Enumeration can provide information regarding usernames and accounts.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413224,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"A __________ is used to represent a password.","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"A password hash is commonly used to represent a password in an encrypted format that is not reversible in locations such as the SAM database.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413218,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"What does the enumeration phase not discover?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"Ports are usually uncovered during the scanning phase and not the enumeration phase.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413219,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:27","questionName":"How would you use Netcat to set up a server on a system?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Netcat uses the syntax nc \u2013l \u2013p to listen on a specific port, with the port number being specified as a number following the\u2013p. For example, nc \u2013l \u2013p 1000 would tell the server to listen on port 1000 for incoming connections.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413230,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"ADS requires what to be present?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"NTFS is required in order to use ADS.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413231,"quiz_id":"21012","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:37:12","updated_at":"2018-03-23 06:37:28","questionName":"What utility may be used to stop auditing or logging of events?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"Auditpol is used to stop the logging of events on a Windows system.","question_score_id":null,"lang":null,"questionAudioPath":null}]
413221
0
60
block

How is a brute-force attack performed?

Wybierz prawidłowe odpowiedzi  

(0/0)












413227
0
60
none
413225
0
60
none
413220
0
60
none
413229
0
60
none
413228
0
60
none
413222
0
60
none
413223
0
60
none
413226
0
60
none
413217
0
60
none
413224
0
60
none
413218
0
60
none
413219
0
60
none
413230
0
60
none
413231
0
60
none