Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 11 ) A pen tester is using rainbow tables to find the clear text passwo

ID: 3910701 • Letter: Q

Question

Question 11 ) A pen tester is using rainbow tables to find the clear text password that matches an NT hash dumped from a Windows system. Given the partial rainbow table information below, what does it mean if one of the NT hashes matches the following lookup chain?

Chain XI

Password Hash

r@nd0M 7ddf32e17a6ac5ce04a8ecbf782ca509

account's password will be found by reversing the chain's end hash value.

The account's password will be found by running reduction functions on the matching chain. The chain match indicates the account's NT hash must be 7ddf32e17a6ac5ce04a8ecbf782ca509.

The reduction function indicates the account's password must be r@nd0M.

( Question 12 ) You are examining the results of a web browsing session. What can you derive from the following?

GET /sample_directory/sample_file.html HTTP/1.1 Authorization: Basic em9tYmllOmJyYWlucw==

The username is "Basic" and the password hash is "em9tYmllOmJyYWlucw=="

There is no username or password being sent

The username and password are encoded using an MD5 hash

The username and password are encoded using base64 encoding

( Question 13 ) Examine the screen shot below.

server did not accept screen shot- will post later

What is the effect of deploying the GPO "Event Log Size"?

The Authenticated Users group must approve the GPO template prior to it being enabled.

The policy will be enabled but can be blocked by the OU administrator.

The workstations are not required to participate in the deployed group policy unless it is enforced.

The policy must be authenticated by the domain administrator prior to being enabled on the local workstation.

( Question 14 ) Hash functions are used primarily to ensure which of the following?

Message integrity

Secret key exchange

Confidentiality

Adequate key length

(Question 15 ) You discover that your border router is receiving packets with a source address subnet of 172.20.18.0/24.

What action should be taken?

The packets should pass through untouched.

The packets should be dropped at the router.

The packets should be logged.

The packets should be routed to the internal network.

( Question 16 ) Your company has deployed whole-disk encryption as a way to protect confidential information. In which of the following scenarios is the data specifically protected by this action?

When it is written to a page file

When it is copied to a flash drive

When it is in transit on the network

When it is in working memory

( Question 17 ) Which of the following is used when a recipient verifies the digital signature of a PGP message?

Sender's Private Key

SHA-1024

MD5

Sender's public key

( Question 18 ) What are two architectural approaches to Defense-in-Depth?

Top down and waterfall

Information centric and protected enclaves

Threat vector analysis and business impact analysis

De-centralized and clustered

( Question 19 ) You have been asked to scan your company's computers for operating system vulnerabilities. Which of the following tools would you use?

Nessus

Netcat

HPing3

Legion

( Question 20 ) How do you differentiate between the network and the host components of an IP address?

Using the IP Protocol field

Using the IP ID field

Using the gateway address

Using the netmask

Explanation / Answer

Ans:

Q.19)

option A

Nessus

Explanation:

Nessus is a vulnerability scanner for operating systems. It works on various operating systems like Windows, linux etc. It is developed by Tenable network security. It can check various kinds of vulnerabilities like which allow hacker to gain control to our system and can attack by sending malware into our network using loophole found in the operating system. Nessus does an interesting thing that it attacks on the passwords of our system using various known methods like dictionary attack etc and if it can be able to detect the password it will prompt user to change the password since it found the vulnerability.  

Q.20) option D

netmask

Explanation:

To extract network id and host id form the given ip address we can use netmask(subnet mask) .

step 1: Find IP address and subnet mask of the network device

step 2: Perform Logical AND operation between ip address and subnet mask, the resultant is Network address

step 3:perform Logical AND between ip address and 255.255.255.255, the resultant is broadcast address

step 4:The difference between network address and broadcast address comes under host addresses

Example: Given ip address 167.21.120.127

(AND) subnet mask 255.255.255.248

----------------------------------

167.21.120.120 <-------- Network id

------------------------------------

167.21.120.127

(AND) 255.255.255.248

------------------------

167.21.120.127 <---------- Broadcast address

Therefore the host address rang from 167.21.120.121 to 167.21.120.126

Please like my answer if u are satisfied with it. Thanks!

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote