Reference no: EM133358418
Questions
1. A ______ attack occurs when the attacker obtains a user's password hash from a compromised system and uses it to log into another system.
Man-in-the-middle
Rainbow table
Pass-the-hash
Brute force
2. Modern Windows versions use _____ as an authentication protocol.
Kerberos
NetBIOS
NTLM
DNS
3. In a Kerberos _____ attack, the attacker can manipulate Kerberos tickets based on available hashes by compromising a vulnerable system and obtaining the local user credentials and password hashes.
Pass-the-hash
Black ticket
Silver ticket
Golden ticket
4. In a(n) _______ attack, the attacker places himself or herself in-line between two devices to eavesdrop or manipulate the data being transferred.
Kerberos
Golden ticket
On-path attack
Silver ticket
5. A common mitigation for ARP cache poisoning is to use ________ on switches to prevent spoofing of the Layer 2 addresses.
NetBIOS
DHCP
ARP
DAI
6. BGP hijacking is what type of attack?
Brute force
Route manipulation
DDoS
Spoofing