8.2 Privilege Escalation

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following extracts service account credentials from Active Directory using a brute force for offline cracking over a non-secure network by using tickets or service principal names (SPNs)? -Kerberoasting -Credentials in LSASS -Unattended installation -DLL hijacking

Kerberoasting

Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows? -LSASS -SPNs -SAM -cPasswords

cPasswords

Which of the following best describes the Security Account Manager (SAM)? -The attribute that stores passwords in a Group Policy preference item in Windows. -A file in the directory that performs the system's security protocol. -A protocol that allows authentication over an unsecure network through tickets or service principal names. -A database that stores user passwords in Windows as an LM hash or a NTLM hash.

A database that stores user passwords in Windows as an LM hash or a NTLM hash.

Which of the following is used to remove files and clear the internet browsing history? -cPassword -User Account Control -Steganography -CCleaner

CCleaner

Roger, a security analyst, wants to tighten up privileges to make sure each user has only the privileges they need to do their work. Which of the following additional countermeasure could he take to help protect privelige? -Restrict the interactive logon privileges. -Allow unrestricted interactive logon privileges. -Create plain text storage for passwords. -Instigate multi-factor authentication and authorization.

Instigate multi-factor authentication and authorization.

Which of the following is a tool for cracking Windows login passwords using rainbow tables? -ERD Commander -GreyFish -Trinity Rescue Kit -Ophcrack

Ophcrack

A hacker has gained physical access to a system and has changed an administrator's account password. Which of the following tools did the hacker most likely use to accomplish this? -StegoStick -Timestomp -Ultimate Boot CD -CCleaner

Ultimate Boot CD

Which of the following privilege escalation risks happens when a program is being installed without the constant supervision of the IT employee and fails to clean up after? -DLL hijacking -Gaining credentials in LSASS -Kerberoasting -Unattended installation

Unattended installation

An attacker installed a malicious file in the application directory. When the victim starts installing the application, Windows searches in the application directory and selects the malicious file instead of the correct file. The malicious file gives the attacker remote access to the system. Which of the following escalation methods best describes this scenario? -DLL hijacking -Kerberoasting -Clear text credentials in LDAP -Unattended installation

DLL hijacking


संबंधित स्टडी सेट्स

Martin Luther King Jr. and Civil Disobedience

View Set

Consumer Behavior Exam 1 - Chapter 3

View Set

4. A GAZDASÁG SZEREPLŐI A GAZDASÁGI KÖRFORGÁSBAN ÉS A GAZDASÁGI CIKLUSOK - 1. A PÉNZ TÖRTÉNETE 2. A PÉNZ SZEREPE ÉS FUNKCIÓI

View Set

The Essentials of Human Anatomy and Physiology: Chapter 1 Practice Test (The Human Body: An Orientation)

View Set

Chapt. 5: Adult Health & Nutritional Assessment

View Set