CEH

Ace your homework & exams now with Quizwiz!

Which of the following is the most basic way to counteract SMTP exploitations?

DNS zone restrictions ensure that a server provides copies of zone files to only specific servers.

Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space. Which of the following would be the best password attack for him to choose?

Keyloggers record every stroke on the computer keyboard, but must either be installed manually on each computer with the hardware option, or every user will have to open an email attachment to install the software option. Both processes are very time consuming.

Sam has used malware to access Sally's computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password.Which of the following types of attacks did he use?

Pass the hash is a hacking technique where an attacker uses an underlying NTLM or hash of a user's password to gain access to a server without ever using the actual plaintext password.

On your network, you have a Windows 10 system with the IP address 10.10.10.195. You have installed XAMPP along with some web pages, php, and forms. You want to put it on the public-facing internet, but you are not sure if it has any vulnerabilities.On your Kali Linux system, you have downloaded the nmap-vulners script from GitHub. Which of the following is the correct nmap command to run?

The -sC switch performs a script scan using the default set of scripts.

Which of the following privilege escalation risks happens when a program is being installed without the constant supervision of the IT employee and fails to clean up after?

While being able to install a program throughout a network without having to sit at every computer and having to stay involved with the process during the installation is often necessary, the process comes with risks. If the administrator fails to go back and clean up after the installation, a file called Unattended is left on the individual workstations. The Unattended file is an XML file and has configuration settings used during the installation that can contain the configuration of individual accounts to include admin accounts, making privilege escalation easy on each computer.

Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows?

cPasswords is the name of the attribute that stores passwords in a Group Policy preference item in Windows. This attribute is easy to exploit because Microsoft publishes the public key for the encryption of the account credentials in the group policy preferences. These preferences allow domain admins access to create and deploy in any local user or local admin accounts. The cpasswords are stored in the SYSVOL folder on the domain controllers in an encrypted XML file. Any user can view the public key and decrypt the passwords to escalate their security privileges.


Related study sets

Knowledge Check 8 - Group Policy

View Set

AP Environmental Science El Nino FRQ

View Set

Understanding Sequential Statements in Python

View Set

Animal Science Companion Animals

View Set

Forensic science Unit 1 Review Questions

View Set

Ch 11 Drinking Alcohol Responsibility

View Set

Chapter 5: Cost-Volume-Profit Relationships

View Set