1. Enumeration is useful to system hacking because it provides __________.
- A) Passwords
- B) IP ranges
- C) Configuration
- D) Usernames
Show Answer
2. What does the enumeration phase not discover?
- A) Services
- B) User accounts
- C) Ports
- D) Shares
Show Answer
3. How would you use Netcat to set up a server on a system?
- A) nc –l –p 192.168.1.1
- B) nc –l –p 1000
- C) nc –p –u 1000
- D) nc –l –p –t 192.168.1.1
Show Answer
4. __________ is the process of exploiting services on a system.
- A) System hacking
- B) Privilege escalation
- C) Enumeration
- D) Backdoor
Show Answer
5. How is a brute-force attack performed?
- A) By trying all possible combinations of characters
- B) By trying dictionary words
- C) By capturing hashes
- D) By comparing hashes
Show Answer
6. A __________ is a type of offline attack.
- A) Cracking attack
- B) Rainbow attack
- C) Birthday attack
- D) Hashing attack
Show Answer
7. An attacker can use a(n) __________ to return to a system.
- A) Backdoor
- B) Cracker
- C) Account
- D) Service
Show Answer
8. A __________ is used to represent a password.
- A) NULL session
- B) Hash
- C) Rainbow table
- D) Rootkit
Show Answer
9. A __________ is a file used to store passwords.
- A) Network
- B) SAM
- C) Database
- D) NetBIOS
Show Answer
10. __________ is a hash used to store passwords in older Windows systems.
- A) LM
- B) SSL
- C) SAM
- D) LMv2
Show Answer
11. __________ is used to partially encrypt the SAM.
- A) SYSKEY
- B) SAM
- C) NTLM
- D) LM
Show Answer
12. Which system should be used instead of LM or NTLM?
- A) NTLMv2
- B) SSL
- C) Kerberos
- D) LM
Show Answer
13. NTLM provides what benefit versus LM?
- A) Performance
- B) Security
- C) Mutual authentication
- D) SSL
Show Answer
14. ADS requires what to be present?
- A) SAM
- B) Domain
- C) NTFS
- D) FAT
Show Answer
15. What utility may be used to stop auditing or logging of events?
- A) ADS
- B) LM
- C) NTFS
- D) Auditpol
Show Answer
16. On newer Windows systems, what hashing mechanism is disabled?
- A) Kerberos
- B) LM
- C) NTLM
- D) NTLMv2
Show Answer
17. Which of the following is a utility used to reset passwords?
- A) TRK
- B) ERC
- C) WinRT
- D) IRD
Show Answer
18. A good defense against password guessing is __________.
- A) Complex passwords
- B) Password policy
- C) Fingerprints
- D) Use of NTLM
Show Answer
19. If a domain controller is not present, what can be used instead?
- A) Kerberos
- B) LM
- C) NTLMv1
- D) NTLMv2
Show Answer
20. Alternate Data Streams are supported in which file systems?
- A) FAT16
- B) FAT32
- C) NTFS
- D) CDFS