What is the name of the software tool used to crack a single account on Netware Servers using a
dictionary attack? correct answer:B. NWPCrack
How can you determine if an LM hash you extracted contains a password that is less than 8
characters long? correct answer:B. The right most portion of the hash is always the same
Several of your co-workers are having a discussion over the etc/passwd file. They are at odds
over what types of encryption are used to secure Linux passwords.(Choose all that apply). correct
answer:A. Linux passwords can be encrypted with MD5
C. Linux passwords can be encrypted with DES
D. Linux passwords can be encrypted with Blowfish
What are the two basic types of attacks?(Choose two correct answer:.B. Passive
D. Active
Sniffing is considered an active attack? correct answer:B. False
When discussing passwords, what is considered a brute force attack? correct answer:A. You attempt
every single possibility until you exhaust all possible combinations or discover the
password
Question: 7
Which of the following are well know password-cracsheets programs?(Choose all that apply. correct
answer:A. L0phtcrack
E. John the Ripper
Question: 8
Password cracsheets programs reverse the hashing process to recover passwords.(True/False correct
answer:B. False :
Explanation:
Password cracsheets programs do not reverse the hashing process. Hashing is a one-way
process.
What these programs can do is to encrypt words, phrases, and characters using the same
encryption process and compare them to the original password. A hashed match reveals the true
password
Question: 9
What does the following command achieve?
Telnet <IP Address> <Port 80>
HEAD /HTTP/1.0
<Return>
<Return> correct answer:C. This command returns the banner of the website specified by IP address
Question: 10