Quiz 4: Enumeration & Password Cracking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following command-line switches would you use for Operating System detection in Nmap?

-O

What file contains a list of the groups on a Linux system?

/etc/group

What file contains a list of the users on a Linux system?

/etc/passwd

Where are the encrypted passwords stored in Linux?

/etc/shadow

When working with Windows systems, what is the RID of the true administrator account?

500

Which of the following is considered an off-line password cracking tool?

John the Ripper (aka John)

____ is the process of identifying the services and resources a target uses. It is an active form of reconnaissance.

Enumeration

By default, Windows Vista and Windows 7 store both the LM and NT hashes.

False

Jessie has scanned the web server with NMAP. However, he could not gather enough information to help him identify the operating system running on the remote host accurately. What would you suggest to Jessie to help identify the OS that is being used on the remote web server?

Telnet to an open port and grab the banner.

In terms of passwords, what is considered a brute force attack?

You attempt every single possibility until you exhaust all possible combinations or discover the password


Set pelajaran terkait

Chapters 1-4 Quiz Questions Network+

View Set

Teaching Reading: Elementary (5205)

View Set

EAQ #6 Transient Ischemic Attack (TIA) and Stroke & Neuro and M/S

View Set

Lecture 13: Microevolution: Population genetics and speciation (Major Concepts)

View Set

Principles of Business: Chapter 18

View Set

economics : saving and borrowing

View Set

Ch. 16: Program Management, Chapter 16: Program Management, NURS 450 - Ch. 21

View Set