Which password cracking method is likely to be used

Assignment Help Computer Engineering
Reference no: EM132344684

Assignment: Solve the given multiple choice questions:

1. If an attacker already has some information about the password, such as the number of letters and numbers used in the password, which password cracking method is likely to be used?

a. syllable
b. rule-based
c. hybrid
d. rainbow

2. In which type of attack does an unauthorized user monitor communications to gather information?

a. active
b. communication
c. network
d. passive

3. In which type of attack does the attacker try to alter or corrupt the data or services on a network?

a. Sniffing
b. Active
c. Tapping
d. Passive
4. In which type of attack is the goal to degrade the performance of the network by directing unnecessary packets of data toward it?

a. flooding
b. eavesdropping
c. fragmentation
d. manipulation

5. What can you do to reset the BIOS password on some systems?

a. remove the BIOS chip
b. unseat the CPU for 10 minutes
c. remove the CMOS battery
d. unplug the computer for 24 hours

6. What command will capture Web-based traffic?

a. nmap /TCP
b. airodump /internet
c. wireshark -web
d. tcpdump port 80

7. What method for securing a WAP uses the Data Link layer address to restrict unauthorized users?

a. MAC filtering
b. WEP encryption
c. SSID non-broadcast
d. IP address filter

8. What tool might an investigator use to measure the wireless field's strength?

a. iStubmbler
b. RMS
c. FSM
d. Kismet

9. What type of MITM attack would use ARP poisoning?

a. passive
b. manipulation
c. eavesdropping
d. DoS

10. Which of the following is a method used by password crackers to discover passwords?

a. dictionary search
b. linear algorithm
c. phonic attack
d. character recognition

11. Which technique do hackers use to locate insecure wireless networks while driving around?

a. Warcruising
b. Warflying
c. Wardriving
d. Warchalking

12. Which tool attempts to confuse the connected wireless devices by sending deauthentication packets?

a. Kismet
b. Airodump
c. Aireplay
d. Tcpdump

13. Which tool builds 60 connections at a time and can find passwords for HTTP, POP3, FTP, and Telnet servers?

a. ophrack
b. Brutus
c. Cain & Abel
d. PassView

14. Which tool captures password that pass through the network adapter and displays them on the screen and works on Windows 32-bit OSs?

a. Password Spectator
b. SniffPass
c. PassView
d. MessenPass

15. Which tool is a DOS-based solution designed for resetting local administrator and user passwords on Windows server and desktop systems?

a. ERD Commander
b. CmosPwd
c. Active@ Password Changer
d. Windows Key Generator

16. Which tool is used to audit and recovers user account passwords in Windows OSs?

a. ophrack
b. LCP
c. Cain & Abel
d. DNA

17. Which tool utilizes the unused processing power of multiple machines across the network to decrypt passwords?

a. Passware Kit
b. Word Password Recovery Master
c. Accent Keyword Extractor
d. Distributed Network Attack (DNA)

18. Which type of attack is based on the cryptanalytic time-memory trade-off technique?

a. dictionary
b. syllable
c. hybrid
d. rainbow

19. Which type of password crack is the combination of both a brute force attack and a dictionary attack?

a. Hybrid
b. rainbow
c. syllable
d. rule-based

20. Which wireless hacking technique involves placing a special symbol on a sidewalk or another surface to indicate a nearby wireless network that offers Internet access?

a. Warchalking
b. Wifisymbols
c. Warwalking
d. Wifimarking

Reference no: EM132344684

Questions Cloud

How does change impact motivation of employees : How does change impact motivation of employees? Discuss how you would communicate with these employees and what you will tell them about the EHR implementation
Electronic health record-computerized provider order entry : Discuss how the electronic health record (EHR) and computerized provider order entry (CPOE) work together. Describe 2 barriers to adoption of these systems.
Opportunities to reinforce the materials outside : How will you ensure that all students have the same opportunities to reinforce the materials outside of the classroom?
Determine the revenue that novak will recognize in 2017 : Based on Novak's significant experience with these types of policies, it estimates that policyholders on average renew the policy for 4.5 years after the first.
Which password cracking method is likely to be used : If an attacker already has some information about the password, such as the number of letters and numbers used in the password, which password cracking method.
What differences exist among the groups : What differences exist among the groups in which you belong and other groups in your community and How do sociologists explain these differences?
What are some examples of fixed assets : What are the fixed assets and cost determination in financial statements? What are some examples of fixed assets?
What is pornography : What is pornography? Is the wide availability of pornography good or harmful for society?
Functions and function notation : Review the assigned reading, paying particularly close attention to "Why It Matters: Functions and Function Notation,"

Reviews

Write a Review

Computer Engineering Questions & Answers

  Choose third-party control available for visual basic.net

choose a third-party control available for Visual Basic.NET. Discuss how this control is used in an application. What are the advantages and disadvantages of using third-party controls in your applications.

  Gear presentation

Frederick Jackson, one of the owners of Sports Gear, believes it is important to stress sports safety. Construct a solution in which some components are unclear

  Implement a neural network multilayer perceptron

Implement a neural network multilayer perceptron (three layers: one input layer, one hidden layer, and one output layer) with backpropagation algorithm.

  Encode the given sequence using the lz77 algorithm

Encode the following sequence using the LZ77 algorithm:- Assume you have a window size of 30 with a look-ahead buffer of size 15.

  What is the effective access time in ns needed

assume the cache hit ratio is 0.8 and the main memory hit ratio is 0.7. What is the effective access time in ns required to access a referenced word on this system.

  Write down a short assembly language module

Write down a short assembly language module

  What is the isr typically expected to do

What must be allowed to complete before the interrupts is serviced? What resources (CPU, buses, memory, etc..) is the ISR expected to use?

  Create a url object and write the file name

Create a URL object and write the file name, path name, port number, and protocol name for that URL.

  Program for a pizza shop - implement the application

Implement the application in each language, you should keep notes on the features of the languages used, which you found useful, as well as any issues

  Develop an incident-response policy which covers the growth

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Which remote access implementation is the best

Which remote access implementation is the best, Research how to secure your network for remote access

  Explain compound vector functions and systolic program graph

Explain the Compound vector functions, Vector loops and pipeline chaining, Systolic program graphs and Pipeline network or pipe nets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd