Quiz #4
Which of the following data hiding method uses NTFS alternative data streams to hide a file?
ADS
Which type of a password cracking attack uses random numbers and characters in an attempt to discover the password?
Brute force attack
Windows stores user information and passwords in the SAM database for both local and domain accounts.
False
Which of the following tools is a keystroke logger?
Spector
A keystroke logger is software or a hardware device that could be used to monitor and record the user key strokes.
True
The RID code for the Administrator account is 500.
True
The best defense against SNMP enumeration is to block port 161 and disable SNMP if not used.
True
You need to establish a Null session to use tools such as SID2USER,USER2SID, and DumpSec.
True
Which of the following commands provides the NetBIOS name of the computer?
ping -A IP address