What is the most efficient way to crack the passwords f…
A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack
the passwords for the AD users?
What is the broadcast address for the subnet 190.86.168…
What is the broadcast address for the subnet 190.86.168.0/22?
What type of scan is this?
A security engineer is attempting to map a company’s internal network. The engineer enters in the following
NMAP command:
NMAP –n –sS –P0 –p 80 ***.***.**.**
What type of scan is this?
Which of the following is used to indicate a single-lin…
Which of the following is used to indicate a single-line comment in structured query language (SQL)?
Which tool can be used to silently copy files from USB …
Which tool can be used to silently copy files from USB devices?
What is the mostly likely way the attacker has been abl…
An attacker has been successfully modifying the purchase price of items purchased on the company’s web site.
The security administrators verify the web server and Oracle database have not been compromised directly.
They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused
this. What is the mostly likely way the attacker has been able to modify the purchase price?
Which of the following viruses tries to hide from anti-…
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the
chosen service call interruptions when they are being run?
How does an operating system protect the passwords used…
How does an operating system protect the passwords used for account logins?
Which of the following settings enables Nessus to detec…
Which of the following settings enables Nessus to detect when it is sending too many packets and the network
pipe is approaching capacity?
Which attack could the hacker use to sniff all of the p…
A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a
switched environment network. Which attack could the hacker use to sniff all of the packets in the network?