8.1.15 Practice Questions Flashcards

1
Q

You have just run the John the Ripper command shown in the image. Which of the following was this command used for?

admin@ubuntu:~$ zip2jhon secure.zip > secure.txt
ver 1.0 efh 5455 efh 7875 secure.zip/secret.dat PKZIP Encr: 2b1 chk,
TS_chk, cmple n=31, decmplen=19, crc=F6DFB9BA7F
admin@ubuntu:~$

answer

To extract the password and save it in the secure.txt file.

To extract the password hashes and save them in the secure.txt file.

To extract the password and save it in a rainbow table named secure.txt.

To extract the password from a rainbow hash and save it in the secure.txt file.

A

To extract the password hashes and save them in the secure.txt file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Listen to exam instructions
Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password. Which of the following types of non-technical password attack has occured?

answer

Password guessing

Social engineering

Dumpster diving

Shoulder surfing

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

answer

Password guessing

Social engineering

Shoulder surfing

Dumpster diving

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Listen to exam instructions
Which of the following best describes shoulder surfing?

answer

Giving someone you trust your username and account password.

Someone nearby watches you enter your password on your computer and records it.

Guessing someone’s password because it is so common or simple.

Finding someone’s password in the trash can and using it to access their account.

A

Someone nearby watches you enter your password on your computer and records it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Listen to exam instructions
Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?

answer

Password salting

Password sniffing

Keylogging

Pass the hash

A

Password salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[ !”#$%&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghijklmnopqrstuvwxyz{|}~] are the possible values in which of the following hash types?

answer

Mix alpha-numeric

Ascii-32-95

Ascii-32-65-123-4

Alpha-numeric-symbol32-space

A

Ascii-32-95

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following includes all possible characters or values for plaintext?

answer

Chain_num

Chain_len

Charset

Table_index

A

Charset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space.

Which of the following would be the BEST password attack for him to choose?

answer

Dictionary Attack

Brute Force Attack

Rainbow Table Attack

Social Engineering

A

Rainbow Table Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have created and sorted an md5 rainbow crack table. You want to crack the password. Which of the following commands would you use to crack a single hash?

answer

rtgen md5 ascii-32-95 1 20 0 1000 1000 0

rcrack . -l /root/hashes.txt

rtgen sha1 ascii-32-95 1 20 0 1000 1000 0

rcrack . -h 202cb962ac59075b964b07152d234b70

A

rcrack . -h 202cb962ac59075b964b07152d234b70

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?

answer

Brute force

Keylogger

Password sniffing

Pass the hash

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sam has used malware to access Sally’s computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password. Which of the following types of attacks did he use?

answer

Rainbow attack

Pass the hash

Dictionary attack

Password sniffing

A

Pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly