Quiz #4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following data hiding method uses NTFS alternative data streams to hide a file?

ADS

Which type of a password cracking attack uses random numbers and characters in an attempt to discover the password?

Brute force attack

Windows stores user information and passwords in the SAM database for both local and domain accounts.

False

Which of the following tools is a keystroke logger?

Spector

A keystroke logger is software or a hardware device that could be used to monitor and record the user key strokes.

True

The RID code for the Administrator account is 500.

True

The best defense against SNMP enumeration is to block port 161 and disable SNMP if not used.

True

You need to establish a Null session to use tools such as SID2USER,USER2SID, and DumpSec.

True

Which of the following commands provides the NetBIOS name of the computer?

ping -A IP address


Ensembles d'études connexes

Chapter 1.7 scale and proportion

View Set

Chapter 16 APUSH multiple choice

View Set

ATI Substance-Related and Addiction Disorders

View Set

CB - Chapter 11 (Attitude & Attitude Influence)

View Set

Managerial Accounting Ch 2 (3 non-calculation questions)

View Set