Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 (5 points) Question 1 Saved ______________ cache information about a

ID: 3682218 • Letter: Q

Question

Question 1 (5 points) Question 1 Saved ______________ cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.

Question 1 options: Access keys Access tokens ACLs LM hashes

Question 2 (5 points) Question 2 Saved This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).

Question 2 options: DumpSec Net View Nbtstat enum Save

Question 3 (5 points) Question 3 Saved Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?

Question 3 options: It uses the UDP protocol. It transmits its community string in clear text. It comes configured by default on all devices. It cannot be disabled. Save

Question 4 (5 points) Question 4 Unsaved Which of the following are recommended SNMP enumeration countermeasures? (Select all that apply.)

Question 4 options: Remove the SNMP agent on systems were it is not needed. Change default community strings. Encrypt all SNMP traffic. Do not change default community strings. Save

Question 5 (5 points) Question 5 Unsaved What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes?

Question 5 options: password policies challenge/response encrypted session keys strong hash algorithm Save

Question 6 (5 points) Question 6 Unsaved To prevent null sessions to an NT/2000 system, which TCP and UDP ports must you filter to check null sessions on your network?

Question 6 options: 139 and 445 139 and 443 137 and 53 139 and 140 Save Question 7 (5 points)

Question 7 Unsaved Which two commands can be used to enumerate UNIX systems?

Question 7 options: Net view RPCinfo Showmount Nbtstat Save Question 8 (5 points)

Question 8 Unsaved Many steganography tools use a technique that lets them hide messages inside image files by overwriting the __________________.

Question 8 options: watermark least significant bit least significant pixel most significant bit Save

Question 9 (5 points) Question 9 Unsaved This type of rootkit transforms calls from the legitimate application to output the attacker’s data instead of the genuine data.

Question 9 options: user-mode root-mode key-mode kernel-mode Save

Question 10 (5 points) Question 10 Unsaved In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.

Question 10 options: hybrid nontechnical rule-based precomputed hashes Save Question 11 (5 points)

Question 11 Unsaved IT ________________ are designed to evaluate an organization’s security policies and procedures.

Question 11 options: security audits security assessments penetration tests vulnerability assessments Save

Question 12 (5 points) Question 12 Unsaved A _________________ is an attempt to simulate methods that intruders use to gain unauthorized access to an organization’s networked systems and then compromise them.

Question 12 options: security audit security assessment penetration test vulnerability assessment Save

Question 13 (5 points) Question 13 Unsaved Which password attack exploits situations in which users change their passwords by adding a number to their old password?

Question 13 options: syllable hybrid brute force dictionary Save Question 14 (5 points)

Question 14 Unsaved What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)

Question 14 options: They are short. They are converted to lower case. They are converted to upper case. If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters Save

Question 15 (5 points) Question 15 Unsaved Which of the following relative identifiers (RID) listed below identifies the administrator account on a Windows system?

Question 15 options: 501 512 500 502 Save Question 16 (5 points)

Question 16 Unsaved ________________ trees illustrate who, when, why, how, and with what probability an attacker might strike a system.

Question 16 options: Threat Vulnerability Attack Fault Save Question 17 (5 points)

Question 17 Unsaved __________________ are evaluations of a network’s vulnerability to attack through a variety of means.

Question 17 options: Security audits Security assessments Penetration tests Vulnerability assessments Save

Question 18 (5 points) Question 18 Unsaved SNMP uses ___________________ to define the information that a managed system offers.

Question 18 options: Management Information Bases (MIBs) Simple Network Management Protocol SNMPUTIL object identifiers Save

Question 19 (5 points) Question 19 Unsaved Which of the following methods are considered nontechnical password attacks? (Select all that apply.)

Question 19 options: social engineering brute force dictionary shoulder surfing Save Question 20 (5 points)

Question 20 Unsaved ________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.

Question 20 options: Found Scan AppScan CyberCop Scanner Hackshield Save

Explanation / Answer

Solution:

Question 1: B

Access token cache information about a log-in session for a particular user and remain valid until the user logs out or uses another system to access resources.

Explanation: An access token is generally generated by the login service when the user logs on to the computer or a system and the credentials provided by the user are authenticated.It remains valid until the user logs out.

Question 2: C

Nbtstat

Explanation:

NBTSTAT - NetBT Statistics is used for troubleshooting network NetBIOS names over TCP/IP (NetBT) resolution problems from the command line. It displays protocol statistics and current TCP/IP connections that are using NetBT.

Question 3: B

It transmits its community string in clear text.

Question 4: A

Remove the SNMP agent on systems where it is not needed

Explanation:

SNMP can reveal plenty of information that can be used for hacking, so it is quite necessary to prevent its enumeration by removing SNMP agent from target system or turning off the SNMP service.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote