- (Topic 1)
In the context of password security: a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive - though slow. Usually, it tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary combined together to have variations of words, what would you call such an attack?
Correct Answer:C
- (Topic 4)
Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
Correct Answer:A
- (Topic 5)
Which of the following techniques will identify if computer files have been changed?
Correct Answer:C
- (Topic 4)
What statement is true regarding LM hashes?
Correct Answer:D
- (Topic 4)
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
Correct Answer:B