Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
ECC describes a hypervisor-level rootkit as one that essentially replaces your actual operating system with a virtual one.
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
Which of the following is an example of a passive online password attack?
Sniffing subnet traffic to intercept a password
Which of the following is the most likely explanation in the situation When performing standard maintenance on a database server, you notice one hour of time missing from the log file during what would normally be regular operation hours. Further investigation reveals that there have been no user complaints about accessibility.
The server was compromised by an attacker.
LM employs which encryption standard?
DES
Is this person using safe password procedures? While pen-testing a client, you learn that LM hashing with no salting is still used on most systems for backward compatibility. The hash of one stolen password is 9FAF6B755DC38E12AAD3B435B51404EE.
No, the hash reveals a seven-character-or-less password has been used.
On a Windows 7 system, where is the SAM file stored?
C:\Windows\System32\Config\
The best defines a hybrid attack is which of the following?
The attack uses a dictionary list, substituting letters, numbers, and characters in the words until the password is cracked.
The best definition of steganography is which of the following?
Steganography is used to hide information within existing files.
Which authentication measure best describes in the situation that a user on Joe’s network does not need to remember a long password and users on Joe’s network log in using a token and a four-digit PIN?
Two-factor authentication
Which password theft method is almost always successful, requires little technical knowledge, and is nearly impossible to detect?
Installing a hardware keylogger
Which of the following is the correct command to execute the file in the situation that an attacker has hidden badfile.exe in the readme.txt file?
start readme.txt:badfile.exe
What order, from bottom to top, does the TCP/IP architecture use?
Network interface, Internet, Transport, Application
Comments