Course Hero Logo

24 is the process of exploiting services on a system

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 5 - 8 out of 8 pages.

24. __________ is the process of exploiting services on a system.A) System hackingB) Privilege escalationC) EnumerationD) Backdoor
25. How is a brute-force attack performed?
26. A __________ is a type of offline attack.
27. An attacker can use a(n) __________ to return to a system.
28. A __________ is used to represent a password.A) NULL sessionB) HashC) Rainbow tableD) Rootkit
29. A __________ is a file used to store passwords.
30. __________ is a hash used to store passwords in older Windows systems.
31. __________ is used to partially encrypt the SAM.
32. Which system should be used instead of LM or NTLM?A) NTLMv2B) SSLC) KerberosD) LM
33. NTLM provides what benefit versus LM?
34. ADS requires what to be present?
35. What utility may be used to stop auditing or logging of events?
36. On newer Windows systems, what hashing mechanism is disabled?A) KerberosB) LMC) NTLMD) NTLMv2
37. Which of the following is a utility used to reset passwords?
38. A good defense against password guessing is __________.
39. If a domain controller is not present, what can be used instead?
40. Alternate Data Streams are supported in which file systems?A) FAT16B) FAT32C) NTFS
D) CDFS
End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
MBUVHA
Tags
Hacker, Black hat, White hat, Grey hat

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture