Reference no: EM132344684
Assignment: Solve the given multiple choice questions:
1. If an attacker already has some information about the password, such as the number of letters and numbers used in the password, which password cracking method is likely to be used?
a. syllable
b. rule-based
c. hybrid
d. rainbow
2. In which type of attack does an unauthorized user monitor communications to gather information?
a. active
b. communication
c. network
d. passive
3. In which type of attack does the attacker try to alter or corrupt the data or services on a network?
a. Sniffing
b. Active
c. Tapping
d. Passive
4. In which type of attack is the goal to degrade the performance of the network by directing unnecessary packets of data toward it?
a. flooding
b. eavesdropping
c. fragmentation
d. manipulation
5. What can you do to reset the BIOS password on some systems?
a. remove the BIOS chip
b. unseat the CPU for 10 minutes
c. remove the CMOS battery
d. unplug the computer for 24 hours
6. What command will capture Web-based traffic?
a. nmap /TCP
b. airodump /internet
c. wireshark -web
d. tcpdump port 80
7. What method for securing a WAP uses the Data Link layer address to restrict unauthorized users?
a. MAC filtering
b. WEP encryption
c. SSID non-broadcast
d. IP address filter
8. What tool might an investigator use to measure the wireless field's strength?
a. iStubmbler
b. RMS
c. FSM
d. Kismet
9. What type of MITM attack would use ARP poisoning?
a. passive
b. manipulation
c. eavesdropping
d. DoS
10. Which of the following is a method used by password crackers to discover passwords?
a. dictionary search
b. linear algorithm
c. phonic attack
d. character recognition
11. Which technique do hackers use to locate insecure wireless networks while driving around?
a. Warcruising
b. Warflying
c. Wardriving
d. Warchalking
12. Which tool attempts to confuse the connected wireless devices by sending deauthentication packets?
a. Kismet
b. Airodump
c. Aireplay
d. Tcpdump
13. Which tool builds 60 connections at a time and can find passwords for HTTP, POP3, FTP, and Telnet servers?
a. ophrack
b. Brutus
c. Cain & Abel
d. PassView
14. Which tool captures password that pass through the network adapter and displays them on the screen and works on Windows 32-bit OSs?
a. Password Spectator
b. SniffPass
c. PassView
d. MessenPass
15. Which tool is a DOS-based solution designed for resetting local administrator and user passwords on Windows server and desktop systems?
a. ERD Commander
b. CmosPwd
c. Active@ Password Changer
d. Windows Key Generator
16. Which tool is used to audit and recovers user account passwords in Windows OSs?
a. ophrack
b. LCP
c. Cain & Abel
d. DNA
17. Which tool utilizes the unused processing power of multiple machines across the network to decrypt passwords?
a. Passware Kit
b. Word Password Recovery Master
c. Accent Keyword Extractor
d. Distributed Network Attack (DNA)
18. Which type of attack is based on the cryptanalytic time-memory trade-off technique?
a. dictionary
b. syllable
c. hybrid
d. rainbow
19. Which type of password crack is the combination of both a brute force attack and a dictionary attack?
a. Hybrid
b. rainbow
c. syllable
d. rule-based
20. Which wireless hacking technique involves placing a special symbol on a sidewalk or another surface to indicate a nearby wireless network that offers Internet access?
a. Warchalking
b. Wifisymbols
c. Warwalking
d. Wifimarking