Which password cracking method is likely to be used

Assignment Help Computer Engineering
Reference no: EM132344684

Assignment: Solve the given multiple choice questions:

1. If an attacker already has some information about the password, such as the number of letters and numbers used in the password, which password cracking method is likely to be used?

a. syllable
b. rule-based
c. hybrid
d. rainbow

2. In which type of attack does an unauthorized user monitor communications to gather information?

a. active
b. communication
c. network
d. passive

3. In which type of attack does the attacker try to alter or corrupt the data or services on a network?

a. Sniffing
b. Active
c. Tapping
d. Passive
4. In which type of attack is the goal to degrade the performance of the network by directing unnecessary packets of data toward it?

a. flooding
b. eavesdropping
c. fragmentation
d. manipulation

5. What can you do to reset the BIOS password on some systems?

a. remove the BIOS chip
b. unseat the CPU for 10 minutes
c. remove the CMOS battery
d. unplug the computer for 24 hours

6. What command will capture Web-based traffic?

a. nmap /TCP
b. airodump /internet
c. wireshark -web
d. tcpdump port 80

7. What method for securing a WAP uses the Data Link layer address to restrict unauthorized users?

a. MAC filtering
b. WEP encryption
c. SSID non-broadcast
d. IP address filter

8. What tool might an investigator use to measure the wireless field's strength?

a. iStubmbler
b. RMS
c. FSM
d. Kismet

9. What type of MITM attack would use ARP poisoning?

a. passive
b. manipulation
c. eavesdropping
d. DoS

10. Which of the following is a method used by password crackers to discover passwords?

a. dictionary search
b. linear algorithm
c. phonic attack
d. character recognition

11. Which technique do hackers use to locate insecure wireless networks while driving around?

a. Warcruising
b. Warflying
c. Wardriving
d. Warchalking

12. Which tool attempts to confuse the connected wireless devices by sending deauthentication packets?

a. Kismet
b. Airodump
c. Aireplay
d. Tcpdump

13. Which tool builds 60 connections at a time and can find passwords for HTTP, POP3, FTP, and Telnet servers?

a. ophrack
b. Brutus
c. Cain & Abel
d. PassView

14. Which tool captures password that pass through the network adapter and displays them on the screen and works on Windows 32-bit OSs?

a. Password Spectator
b. SniffPass
c. PassView
d. MessenPass

15. Which tool is a DOS-based solution designed for resetting local administrator and user passwords on Windows server and desktop systems?

a. ERD Commander
b. CmosPwd
c. Active@ Password Changer
d. Windows Key Generator

16. Which tool is used to audit and recovers user account passwords in Windows OSs?

a. ophrack
b. LCP
c. Cain & Abel
d. DNA

17. Which tool utilizes the unused processing power of multiple machines across the network to decrypt passwords?

a. Passware Kit
b. Word Password Recovery Master
c. Accent Keyword Extractor
d. Distributed Network Attack (DNA)

18. Which type of attack is based on the cryptanalytic time-memory trade-off technique?

a. dictionary
b. syllable
c. hybrid
d. rainbow

19. Which type of password crack is the combination of both a brute force attack and a dictionary attack?

a. Hybrid
b. rainbow
c. syllable
d. rule-based

20. Which wireless hacking technique involves placing a special symbol on a sidewalk or another surface to indicate a nearby wireless network that offers Internet access?

a. Warchalking
b. Wifisymbols
c. Warwalking
d. Wifimarking

Reference no: EM132344684

Questions Cloud

How does change impact motivation of employees : How does change impact motivation of employees? Discuss how you would communicate with these employees and what you will tell them about the EHR implementation
Electronic health record-computerized provider order entry : Discuss how the electronic health record (EHR) and computerized provider order entry (CPOE) work together. Describe 2 barriers to adoption of these systems.
Opportunities to reinforce the materials outside : How will you ensure that all students have the same opportunities to reinforce the materials outside of the classroom?
Determine the revenue that novak will recognize in 2017 : Based on Novak's significant experience with these types of policies, it estimates that policyholders on average renew the policy for 4.5 years after the first.
Which password cracking method is likely to be used : If an attacker already has some information about the password, such as the number of letters and numbers used in the password, which password cracking method.
What differences exist among the groups : What differences exist among the groups in which you belong and other groups in your community and How do sociologists explain these differences?
What are some examples of fixed assets : What are the fixed assets and cost determination in financial statements? What are some examples of fixed assets?
What is pornography : What is pornography? Is the wide availability of pornography good or harmful for society?
Functions and function notation : Review the assigned reading, paying particularly close attention to "Why It Matters: Functions and Function Notation,"

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd