Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 43 What type of attack is shown in the above diagram? 2 Attacker Attack

ID: 3721300 • Letter: Q

Question

QUESTION 43 What type of attack is shown in the above diagram? 2 Attacker Attacker intercepts transmission and poses as JaneCo Corporation. Attacker exchanges his own keys with AcmeSin Corporation Attacker then establishes a session with JaneCo Corporation posing as AcmeSin choose the best answer JaneCo Corporation AcmeSin Corporation JaneCo sends all messages to the attacker who receives, decrypts copies, and forwards copies to AcmeSin AcmeSin attempts to establish an encrypted sessiorn with company JaneCo A. SSL Spoofing Attack B. Identity Stealing Attack c. Session Hijacking Attack D- Man-in-the-Middle (MITM) Attack ?? O C o A QUESTION 44 Michael is the security administrator for the ABC company.?Michael has been charged with strengthening the company's security policies, including its password policies Due to certain legacy applications, Michael was only able to enforce a password group policy in Active Directory with a minimum of 10 characters He has informed the company's employees, however, that the new password policy requires that everyone must have complex passwords with at least 14 characters Michael wants to ensure that everyone is using complex passwords that meet the new security policy requirements.Michael has just logged on to one of the network's domain controllers and is about to run the following command What will this command accomplish? Microsoft Windous XP [Wersion 5.1.26001 CC> Copyright 1985-2881 Microoft Corp. >pudunp pud.txt choase the bast anawer A Dumps SAM password hashes to pwd.tt O B. Password history file is piped to pwd.tt O c. Dumps Active Directory password hashes to pwd.txt O D- Internet Cache file is piped to pwd.txt

Explanation / Answer

Answer)

Q43)
In the above diagram we can see that the attacker intercepts the communciation and poses as JaneCo to AcmeSin Corporation and as AcmeSin Corporation to JaneCo. Thus the attacke is posing as a middle man and stealing both the party's data as posing as the righ company to talk to. Thus here the attacker is the middle man between the transmission between 2 companies such as JaneCo Corporation and AcmeSin Corporation, who are under the impression that they are talking to each other but in realty the attacker is communicating with them.

Thus this type of attack is a:

D - Man-in-the-Middle (MiTM) Attack


Q44)
The following command executed by Michaelm the security administrator is:
C:>pwdump > pwd.txt

The above command does the following:
A - Dumps SAM password hashes to pwd.txt

pwdump is the command for the administrator when the administrator wants to dump the SAM passwords in the Windows system to the file pwd.txt.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote