Total No. of Questions = 20

1. Enumeration is useful to system hacking because it provides __________.

  • A) Passwords
  • B) IP ranges
  • C) Configuration
  • D) Usernames

Show Answer

The Correct Answer is:- A,D

2. What does the enumeration phase not discover?

  • A) Services
  • B) User accounts
  • C) Ports
  • D) Shares

Show Answer

The Correct Answer is:- C

3. How would you use Netcat to set up a server on a system?

  • A) nc –l –p 192.168.1.1
  • B) nc –l –p 1000
  • C) nc –p –u 1000
  • D) nc –l –p –t 192.168.1.1

Show Answer

The Correct Answer is:- A

4. __________ is the process of exploiting services on a system.

  • A) System hacking
  • B) Privilege escalation
  • C) Enumeration
  • D) Backdoor

Show Answer

The Correct Answer is:- A

5. How is a brute-force attack performed?

  • A) By trying all possible combinations of characters
  • B) By trying dictionary words
  • C) By capturing hashes
  • D) By comparing hashes

Show Answer

The Correct Answer is:- A

6. A __________ is a type of offline attack.

  • A) Cracking attack
  • B) Rainbow attack
  • C) Birthday attack
  • D) Hashing attack

Show Answer

The Correct Answer is:- B

7. An attacker can use a(n) __________ to return to a system.

  • A) Backdoor
  • B) Cracker
  • C) Account
  • D) Service

Show Answer

The Correct Answer is:- A

8. A __________ is used to represent a password.

  • A) NULL session
  • B) Hash
  • C) Rainbow table
  • D) Rootkit

Show Answer

The Correct Answer is:- B

9. A __________ is a file used to store passwords.

  • A) Network
  • B) SAM
  • C) Database
  • D) NetBIOS

Show Answer

The Correct Answer is:- B

10. __________ is a hash used to store passwords in older Windows systems.

  • A) LM
  • B) SSL
  • C) SAM
  • D) LMv2

Show Answer

The Correct Answer is:- A

11. __________ is used to partially encrypt the SAM.

  • A) SYSKEY
  • B) SAM
  • C) NTLM
  • D) LM

Show Answer

The Correct Answer is:- A

12. Which system should be used instead of LM or NTLM?

  • A) NTLMv2
  • B) SSL
  • C) Kerberos
  • D) LM

Show Answer

The Correct Answer is:- C

13. NTLM provides what benefit versus LM?

  • A) Performance
  • B) Security
  • C) Mutual authentication
  • D) SSL

Show Answer

The Correct Answer is:- B

14. ADS requires what to be present?

  • A) SAM
  • B) Domain
  • C) NTFS
  • D) FAT

Show Answer

The Correct Answer is:- C

15. What utility may be used to stop auditing or logging of events?

  • A) ADS
  • B) LM
  • C) NTFS
  • D) Auditpol

Show Answer

The Correct Answer is:- D

16. On newer Windows systems, what hashing mechanism is disabled?

  • A) Kerberos
  • B) LM
  • C) NTLM
  • D) NTLMv2

Show Answer

The Correct Answer is:- B

17. Which of the following is a utility used to reset passwords?

  • A) TRK
  • B) ERC
  • C) WinRT
  • D) IRD

Show Answer

The Correct Answer is:- A

18. A good defense against password guessing is __________.

  • A) Complex passwords
  • B) Password policy
  • C) Fingerprints
  • D) Use of NTLM

Show Answer

The Correct Answer is:- A

19. If a domain controller is not present, what can be used instead?

  • A) Kerberos
  • B) LM
  • C) NTLMv1
  • D) NTLMv2

Show Answer

The Correct Answer is:- D

20. Alternate Data Streams are supported in which file systems?

  • A) FAT16
  • B) FAT32
  • C) NTFS
  • D) CDFS

Show Answer

The Correct Answer is:- C