Ethical Hacking Module 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

[ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~] are the possible values in which of the following hash types? Mix alpha-numeric Ascii-32-65-123-4 Ascii-32-95 Alpha-numeric-symbol32-space

Ascii-32-95

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using? Pass the hash Keylogger Password sniffing Brute force

Brute force

Which of the following includes all possible characters or values for plaintext? Table_index Chain_len Chain_num Charset

Charset

Hackers can maintain access to a system in several ways. Which of the following best describes the unsecure file and folder method? There is no problem if the path is written within quotation marks and has no spaces This can lead to DLL hijacking and malicious file installations on a non-admin targeted user Services with weak permissions allow anyone to alter the execution of the service The hacker will have rights to do whatever the admin account can do

This can lead to DLL hijacking and malicious file installations on a non-admin targeted user

What is the following John the Ripper command used for? zip2john secure.zip > secure.txt To extract the password and save it in the secure.txt file To extract the password from a rainbow hash and save it in the secure.txt file To extract the password and save it in a rainbow table named secure.txt To extract the password hashes and save them in the secure.txt file

To extract the password hashes and save them in the secure.txt file

James, a hacker, has hacked into a Unix system and wants to change the timestamps on some files to hide his tracks. Which of the following timestamp tools would he most likely use? Timestomp Meterpreter Touch ctime

Touch

A hacker has gained physical access to a system and has changed an administrator's account password. Which of the following tools did the hacker most likely use to accomplish this? Timestomp CCleaner Ultimate Boot CD StegoStick

Ultimate Boot CD

Which of the following privilege escalation risks happens when a program is being installed without the constant supervision of the IT employee and fails to clean up after? Gaining credentials in LSASS Kerberoasting DLL hijacking Unattended installation

Unattended installation

Phil, a hacker, has found his way into a secure system. He is looking for a Windows utility he can use to retrieve, set, back up, and restore logging policies. Which of the following utilities should he consider? poledit gpedit secedit auditpol

auditpol

Who would be most likely to erase only parts of the system logs file? An everyday user A black hat hacker A penetration tester The network admin

A black hat hacker

Which of the following best describes the Security Account Manager (SAM)? A file in the directory that performs the system's security protocol A database that stores user passwords in Windows as an LM hash or a NTLM hash A protocol that allows authentication over an unsecure network through tickets or service principal names The attribute that stores passwords in a Group Policy preference item in Windows

A database that stores user passwords in Windows as an LM hash or a NTLM hash

Which of the following is sued to remove files and clear the internet browsing history? CCleaner User Account Control cPassword Steganography

CCleaner

Which of the following best describes a rootkit? Scans the system and compares the current scan to the clean database Can modify the operating system and the utilities of the target system Allows each file an unlimited number of data streams with unlimited size Allows the user to create a password to make the hidden file more secure

Can modify the operating system and the utilities of the target system

Roger, a security analyst, wants to tighten up privileges to make sure each user has only the privileges they need to do their work. Which of the following additional countermeasures could he take to help protect privilege? Instigate multi-factor authentication and authorization Allow unrestricted interactive logon privileges Restrict the interactive logon privileges Create plain text storage for passwords

Instigate multi-factor authentication and authorization

Which of the following system exploitation methods happens by adding a malicious file to a file path that is missing quotation marks and has spaces in it? Writable services Spyware Path interception Unsecure file and folder permissions

Path interception

Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space. Which of the following would be the best password attack for him to choose? Brute force attack Dictionary attack Rainbow attack Keylogger attack

Rainbow attack

Which of the following best describes the heuristic or behavior-based detection method? Searches for execution path hooking, which allows a function value in an accessible environment to be changed. Uses an algorithm as it goes through the system files, processes, and registry keys to create a baseline that is compared to the data returned by the operating system's APIs. Runs a tool to scan a clean system and create a database, then scans the system and compares the current scan to the clean database. Scan a system's processes and executable files, looking for byte sequences of known malicious rootkit programs.

Searches for execution path hooking, which allows a function value in an accessible environment to be changed.

Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows? SPNs LSASS cPasswords SAM

cPasswords

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled? Social engineering Dumpster diving Shoulder surfing Password guessing

Dumpster diving

Which of the following could a hacker use Alternate Data Streams (ADS) for? Tracking evidence Erasing evidence Modifying evidence Hiding evidence

Hiding evidence

Which of the following is a protocol that allows authentication over a non-secure network by using tickets or service principal names (SPNs)? Unattended installation Credentials in LSASS Kerberoasting DLL hijacking

Kerberoasting

Which of the following best describes shoulder surfing? Giving someone you trust your username and account password. Finding someone's password in the trash can and using it to access their account. Guessing someone's password because it is so common or simple. Someone nearby watches you enter your password on your computer and records it.

Someone nearby watches you enter your password on your computer and records it.

Which of the following is malware that works by stealth to capture information and then sends it to a hacker to gain remote access? Writable services Spyware Crackers ERD Commander

Spyware

Cameron wants to send secret messages to his friend Brandon, who works at a competitor's company. To secure these messages, he uses a technique to hide a secret message within a video. Which of the following techniques is he using? Public-key cryptograph Encryption RSA algorithm Steganography

Steganography

Which of the following do hackers install in systems to allow them to have continued admittance, gather sensitive information, or establish access to resources and operations within the system? Backdoors Crackers Kerberos cPassword

Backdoors

Sam has used malware to access Sally's computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password. Which of the following types of attacks did he use? Dictionary attack Rainbow attack Password sniffing Pass the hash

Pass the hash

You believe your system has been hacked. Which of the following is the first thing you should check? Modified timestamps Browser history System log files Hidden files

System log files

Which of the following best describes CCleaner? A command line tool in Windows 2000 that will dump a remote or local event log into a tab-separated text file. It can also be used to filter specific types of events. A program that searches for carrier files through statistical analysis techniques, scans for data hiding tools, and can crack password-protected data to extract the payload. A software that can clear cookies, stored data like passwords, browser history, and temporary cached filed. It can clear the recycling bin, clipboard data, and recent documents lists as well. A tool that can remove files and clear internet browsing history. It also frees up hard disk space. It clears the temporary files, history, and cookies from each of the six major search engines.

A tool that can remove files and clear internet browsing history. It also frees up hard disk space. It clears the temporary files, history, and cookies from each of the six major search engines.

Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to clean the database. Which of the following detection methods is Jerry using? Integrity-based Cross view-based Behavior-based Signature-based

Integrity-based

The method of embedding data into legitimate files like graphics to hide it and then extracting the data once it reaches its destination is called: NTFS data streaming Execution path profiling Steganography Rootkits

Steganography

You have created and sorted an md5 rainbow crack table. You want to crack the password. Which of the following commands would you use to crack a single hash? rtgen md5 ascii-32-95 1 20 0 1000 1000 0 rcrack . -l /root/hashes.txt rtgen sha1 ascii-32-95 1 20 0 1000 1000 0 rcrack . -h 202cb962ac59075b964b07152d234b70

rcrack . -h 202cb962ac59075b964b07152d234b70

Which of the following is also known as ZeroAccess and has virus, Trojan horse, and rootkit components? Touch DeepSound Sirefef GrayFish

Sirefef

Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password. Which of the following types of non-technical password attack has occurred? Password guessing Shoulder surfing Dumpster diving Social engineering

Social engineering

Which of the following is a tool for cracking Windows login passwords using rainbow tables? Trinity Rescue Kit GreyFish ERD Commander Ophcrack

Ophcrack

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash? Pass the hash Keylogging Password salting Password sniffing

Password salting

An attacker installed a malicious file in the application directory. When the victim starts installing the application, Windows searches in the application directory and selects the malicious file instead of the correct file. The malicious file gives the attacker remote access to the system. Which of the following escalation methods best describes this scenario? DLL hijacking Kerberoasting Unattended installation Clear text credentials in LDAP

DLL hijacking

Mark is moving files from a device that is formatted using NTFS to a device that is formatted using FAT. Which of the following is he trying to get rid of? Antivirus and anti-spyware programs Encrypted steganographic information Malicious alternate data streams Software programs that hackers use

Malicious alternate data streams

A hacker finds a system that has a poorly designed and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor? Timestomp Metasploit CCleaner AuditPol

Metasploit


Set pelajaran terkait

HHMI BioInteractive: Sickle Cell

View Set

Biology 1409 Chapter 29 Reading Questions

View Set

MKT 3301 - TEST 1 _ CH 1-3_other sources

View Set

Journalizing & Posting Transactions (ch.4)

View Set

NUTR 2351 Minerals - 10/15/20 - 10/20/20-10/22/20

View Set

PEDs Chapt 16 Nursing Care of the Child with a Neurologic Disorder

View Set

PrepU Chap24: Asepsis and Infection Control

View Set