6.6.8 Practice Questions Security Pro

¡Supera tus tareas y exámenes ahora con Quizwiz!

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Brute force attack

Which of the following password attacks uses preconfigured matrices of hashed dictionary words?

Rainbow table attack

Carl receives a phone call from a woman who states she is calling from his bank. She tells him that someone has tried to access his checking account, and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password. Which of the following types of non-technical password attack has occurred?

Social engineering

Which of the following BEST describes shoulder surfing?

Someone nearby watching you enter your password on your computer and recording it.

An organization notices an external actor trying to gain access to the company network. The attacker is not targeting a specific account but rather using the same password across a vast range of usernames in hopes that one might be correct. What type of attack BEST describes this scenario?

Spraying

You want to check a server for user accounts that have weak passwords. Which tool should you use?

John the Ripper

A hacker successfully exfiltrates a database of user passwords and attempts to gain access to it as the hacker can now go around the authentication system. What type of attack has the hacker achieved?

Offline

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?

Password salting

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

Dumpster diving

Which social engineering technique involves the attacker interacting with the user to trick them into revealing their username and password?

User manipulation


Conjuntos de estudio relacionados

NUR 307 - Chapter 41: Nursing Care of the Child With an Alteration in Perfusion/Cardiovascular Disorder

View Set

AP European History Chapter 24 Test

View Set

MAN 3120 Chapter 5 Quiz Questions

View Set

SCM 470 - Process Fundamentals and Inventory Management Review

View Set

Contracts and Sales - Kinsler Fall 2024

View Set

Immunostimulants and Immunomodulators (Chap 48)

View Set

Lesson 3: Perception and the Communication Process

View Set

theatre appreciation: chapter 11

View Set

Vocab Unit 10 Completing the Sentence

View Set