Dcom 214 Quiz 3

Ace your homework & exams now with Quizwiz!

What is the algorithm used by LM for Windows 10 SAM ? A.) NTLMv2 B.) MD5 C.) RIPEMD D.) MS CHAPv2

A.) NTLMv2

What are twp types of ICMP code used when using the ping command? A.) It uses types 15 and 17 B.) It uses types 0 and 8. C.) It uses types 13 and 14 D.) The ping command does not use ICMP but uses UDP

B.) It uses types 0 and 8

Usernames, passwords, e-mail addresses, and the location of CGI scripts may be obtained from which of the following information sources? A.) Company web site B.) Search engines C.) EDGAR Database query D.) Whois query

A.) Company Website

What is "Hacktivism"? A.) Hacking for a cause B.) An association which groups activists C.) None of the above D.) Hacking ruthlessly

A.) Hacking for a cause

What does the following command achieve? Telnet <IP Address> <Port 80> HEAD /HTTP/1.0 <Return> <Return> A.) This command returns the banner of the website specified by IP address B.) This command allows a hacker to determine the sites security C.) This command opens a backdoor Telnet session to the IP address specified D.) This command is bogus and will accomplish nothing E.) This command returns the home page for the IP address specified

A.) This command returns the banner of the website specified by IP address

What does an ICMP (Code 13) message normally indicates? A.) It is a request to the host to cut back the rate at which it is sending traffic to the Internet destination B.) It indicates that the packet has been administratively dropped in transit C.) It indicates that the destination host is unreachable D.) It indicates to the host that the datagram which triggered the source quench message will need to be re-sent

B.) It indicates that the packet has been administratively dropped in transit

What is a NULL scan? A.) A scan in which all flags are turned off B.) A scan in which all flags are on C.) A scan with a illegal packet size D.) A scan in which certain flags are off E.) A scan in which the packet size is set to zero

A.) A scan in which all flags are turned off

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common? A.) All are tools that are only effective against Linux B.) All are tools that can be used not only by hackers, but also security personnel C.) All are DDOS tools D.) All are tools that are only effective against Windows E.) All are hacsheets tools developed by the legion of doom

C.) All are DDOS tools

What does the term "Ethical Hacker" mean? A.) Someone who is using his/her skills for ethical reasons B.) Someone who is using his/her skills for offensive purposes C.) Someone who is using his/her skills for defensive purposes D.) Someone who is hacsheets for ethical reasons

C.) Someone who is using his/her skills for defensive purposes

What is SYSKEY # of bits used for encryption? A.) 256 B.) 40 C.) 64 D.) 128

D.) 128

The follows is an email header. What address is that of the true originator of the message? Return-Path: <[email protected]> Received: from smtp.com (fw.emumail.com [215.52.220.122]. by raq-221-181.ev1.net (8.10.2/8.10.2. with ESMTP id h78NIn404807 for <[email protected]>; Sat, 9 Aug 2003 18:18:50 -0500 Received: (qmail 12685 invoked from network.; 8 Aug 2003 23:25:25 -0000 Received: from ([19.25.19.10]. by smtp.com with SMTP Received: from unknown (HELO CHRISLAPTOP. (168.150.84.123. by localhost with SMTP; 8 Aug 2003 23:25:01 -0000 From: "Bill Gates" <[email protected]> To: "mikeg" <[email protected]> Subject: We need your help! Date: Fri, 8 Aug 2003 19:12:28 -0400 Message-ID: <51.32.123.21@CHRISLAPTOP> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0052_01C35DE1.03202950" X-Priority: 3 (Normal. X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.2627 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165 Importance: Normal A.) 215.52.220.126 B.) 215.52.220.122 C.) 19.25.19.10 D.) 168.150.84.123 E.) 51.32.123.21

D.) 168.150.84.123

What ICMP message types are used by the ping command? A.) Timestamp request (13) and timestamp reply (14) B.) Echo request (0) and Echo reply (1) C.) Ping request (1) and Ping reply (2) D.) Echo request (8) and Echo reply (0)

D.) Echo request (8) and Echo reply (0)

This kind of password cracking method that uses word lists in combination with numbers and special characters is called: A.) Brute Force B.) Symmetric C.) Linear D.) Hybrid

D.) Hybrid

War dialing is a very old attack and depicted in movies that were made years ago. Why would a modern security examiner consider using such an old technique? A.) It is cool, and if it works in the movies it must work in real life B.) It allows circumvention of the company PBX C.) A good security examer would not use such a derelict technique D.) It allows circumvention of protection mechanisms by being on the internal network

D.) It allows circumvention of protection mechanisms by being on the internal network

What did the following output indicate? C: user2sid \earth guest S-1-5-21-343818398-789336058-1343024091-501 C:sid2user 5 21 343818398 789336058 1343024091 500 Name is Joe Domain is EARTH A.) That the Joe account has a SID of 500 B.) Issued alone, these commands prove nothing C.) These commands demonstrate that the guest account has been disabled D.) That the true administrator is Joe E.) These commands demonstrate that the guest account has NOT been disabled

D.) That the true administrator is Joe


Related study sets

Genetics: Cell Cycle, Mitosis, and Meiosis

View Set

Prevention/Eval/Treatment Exams/Quizzes/ Assignments

View Set