In this type of password attack, the attacker has some information about the pas
ID: 3561019 • Letter: I
Question
In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
Question 1 options:
hybrid
nontechnical
rule-based
precomputed hashes
____________ is a hardware or software tool for recording keystrokes on a target system.
Question 2 options:
Keyboard
KeyScanner
Keylogger
RootKit
Question 3 (5 points)
Which one of the following password hash methods has a 14-character limit?
Question 3 options:
NTLM
NTLMv2
MD5
LM
__________________ are evaluations of a network
hybrid
nontechnical
rule-based
precomputed hashes
Explanation / Answer
1) nontechnical
2) RootKit
3) NTLMv2
4) Penetration tests
5) f the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters
6) firewalls
7) security assessment
8) scope of work agreement
9) LM hashes
10) encrypted session keys
11) key-mode
12) 502
13) %systemroot%system32password
14) dictionary
15) Access tokens
16) It transmits its community string in clear text.
17) 137 and 53
18) CyberCop Scanner
19) NULL$
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.