How do you disable LM authentication in Windows XP?
LM authentication is not as strong as Windows NT authentication so you may want to disable its
use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A
successful attack can compromise the user’s password. How do you disable LM authentication in
Windows XP?
What method of attack is best suited to crack these passwords in the shortest amount of time?
Frederickson Security Consultants is currently conducting a security audit on the networks of
Hawthorn Enterprises, a contractor for the Department of Defense. Since Hawthorn Enterprises
conducts business daily with the federal government, they must abide by very stringent security
policies. Frederickson is testing all of Hawthorn’s physical and logical security measures including
biometrics, passwords, and permissions. The federal government requires that all users must
utilize random, non-dictionary passwords that must take at least 30 days to crack. Frederickson
has confirmed that all Hawthorn employees use a random password generator for their network
passwords. The Frederickson consultants have saved off numerous SAM files from Hawthorn’s
servers using Pwdump6 and are going to try and crack the network passwords. What method of
attack is best suited to crack these passwords in the shortest amount of time?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
What should you do next?
You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don’t
get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any
information. What should you do next?
It deals with the way in which systems convert data from one form to another.
_____ is the process of converting something from one representation to the simplest form. It
deals with the way in which systems convert data from one form to another.
How would you verify if a website is authentic or not?
An Attacker creates a zuckerjournals.com website by copying and mirroring
HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a
car accident. The attacker then submits his fake site for indexing in major search engines. When
users search for “Jason Jenkins”, attacker’s fake site shows up and dupes victims by the fake
news.
This is another great example that some people do not know what URL’s are. Real website:
Fake website: http://www.zuckerjournals.com
The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but
unfortunately some people still do not know what an URL is. It’s the address that you enter into the
address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com
How would you verify if a website is authentic or not?
Which type of attack is port scanning?
Which type of attack is port scanning?
A digital signature is simply a message that is encrypted with the public key instead of the private key.
A digital signature is simply a message that is encrypted with the public key instead of the private
key.
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file
would you find the information in and where?
Select the best answer.
What can he infer from this kind of response?
Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS
scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from
this kind of response?