Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In this type of password attack, the attacker has some information about the pas

ID: 3561019 • Letter: I

Question

In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.

Question 1 options:

hybrid

nontechnical

rule-based

precomputed hashes

____________ is a hardware or software tool for recording keystrokes on a target system.

Question 2 options:

Keyboard

KeyScanner

Keylogger

RootKit

Question 3 (5 points)

Which one of the following password hash methods has a 14-character limit?

Question 3 options:

NTLM

NTLMv2

MD5

LM

__________________ are evaluations of a network

hybrid

nontechnical

rule-based

precomputed hashes

Explanation / Answer

1) nontechnical

2) RootKit

3) NTLMv2

4) Penetration tests

5) f the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters

6) firewalls

7) security assessment

8) scope of work agreement

9) LM hashes

10) encrypted session keys

11) key-mode

12) 502

13) %systemroot%system32password

14) dictionary

15) Access tokens

16) It transmits its community string in clear text.

17) 137 and 53

18) CyberCop Scanner

19) NULL$

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote