SlideShare a Scribd company logo
Buy here:
http://theperfecthomework.com/cmit-321-week-2-quiz/
Where is the password file located on the Windows NT/2000 system?
Question 1 options:
%systemroot%config
%systemroot%system32password
%systemroot%system32SAM.conf
%systemroot%system32config
What component makes Kerberos a more secure network authentication system than NTLM
or LM authentication schemes?
Question 2 options:
password policies
challenge/response
encrypted session keys
strong hash algorithm
What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all
that apply.)
Question 3 options:
They are short.
They are converted to lower case.
They are converted to upper case.
If the password is 10 characters long, it is split into a password of six variable
characters and another hash of four characters
Save
Previous PageNext Page
In this type of password attack, the attacker has some information about the password. For
example, the attacker knows the password contains a two- or three-digit number.
Question 5 options:
hybrid
nontechnical
rule-based
precomputed hashes
Which of the following Windows Utilities can be utilized to enumerate hosts?
Question 6 options:
net Use
net view
net view
net stop
______________ has a unique process for discovering and fixing security holes. The entire
methodology is controlled through an efficient administrative tool that enables you to
compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
Found Scan
AppScan
CyberCop Scanner
Hackshield
SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
a) Management Information Bases (MIBs)
b) Simple Network Management Protocol
c) SNMPUTIL
d
)
object identifiers
Which of the following Management Information
Base (MIB) files contains information about server
services :
Question 9 options:
DCHP.MIB
HOSTMIB.MIB
WINS.MIB
LNMIB2.MIB
What hidden share can be tested for evidence of
null-session vulnerabilities?
Question 10 options:
ADMIN$
NULL$
C$
IPC$
Network Time Protocol (NTP) enumeration
commands include (Choose 3)?
Question 11 options:
Net
time
ntpda
te
ntptra
ce
ntpq
Which one of the following makes the SNMP
protocol a target used by hackers to gather useful
information about target hosts?
Question 12 options:
It
u
s
e
s
t
h
e
U
D
P
p
r
o
t
o
c
o
l.
It
tr
a
n
s
m
it
s
it
s
c
o
m
m
u
n
it
y
s
tr
i
n
g
i
n
c
l
e
a
r
t
e
x
t.
It
c
o
m
e
s
c
o
n
fi
g
u
r
e
d
b
y
d
e
f
a
u
lt
o
n
a
ll
d
e
v
i
c
e
s
.
It
c
a
n
n
o
t
b
e
d
i
s
a
b
l
e
d
.
The SMTP Protocol provides 3 built in commands,
including:
Question 13 options:
V
R
F
Y
E
X
P
N
R
C
P
T
T
O
F
I
N
G
E
R
Save
Previous PageNext Page
The SMTP Protocol provides 3 built in commands,
including:
Question 13 options:
V
R
F
Y
E
X
P
N
R
C
P
T
T
O
F
I
N
G
E
R
Save
Previous PageNext Page
This tool uses the command line to identify and report the protocol statistics of current
TCP/IP connections using NBT (NetBIOS over TCP/IP).
Question 20 options:
DumpSec
Net View
Nbtstat
enum
Save
Previous PageNext Page
________________ has a unique process for discovering and fixing security holes. The
entire methodology is controlled through an efficient administrative tool that enables you to
compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
CMIT 321 WEEK 2 QUIZ

More Related Content

PDF
CMIT 321 WEEK 2 QUIZ.
PDF
CEHv7 Question Collection
PDF
CMIT 321 QUIZ 1
PPT
Operating System Fingerprinting Prevention
PPT
DOCX
CEH v9 cheat sheet notes Certified Ethical Hacker
PPT
CMIT 321 WEEK 2 QUIZ.
CEHv7 Question Collection
CMIT 321 QUIZ 1
Operating System Fingerprinting Prevention
CEH v9 cheat sheet notes Certified Ethical Hacker

What's hot (20)

PDF
OS Fingerprinting
PDF
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
PDF
CTM360 adv-0317-01 dns messenger
PPT
Module 8 System Hacking
PPT
12 tcp-dns
PPT
Hacking 1224807880385377-9
PPT
Hack the hack
DOC
Password hacking
PPT
Hacking tutorial
DOC
Chap04 review
DOCX
Certified Ethical Hacker quick test prep cheat sheet
PPT
Conventional Encryption NS2
PDF
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
PPT
Module 4 Enumeration
PPTX
Attacks and their mitigations
PDF
How to use packet sniffers
PDF
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
PPTX
Tunneling
OS Fingerprinting
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
CTM360 adv-0317-01 dns messenger
Module 8 System Hacking
12 tcp-dns
Hacking 1224807880385377-9
Hack the hack
Password hacking
Hacking tutorial
Chap04 review
Certified Ethical Hacker quick test prep cheat sheet
Conventional Encryption NS2
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
Module 4 Enumeration
Attacks and their mitigations
How to use packet sniffers
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Tunneling
Ad

Similar to CMIT 321 WEEK 2 QUIZ (20)

PDF
CMIT 321 QUIZ 3
PDF
CMIT 321 QUIZ 4
PDF
Top CNSP Exam Dumps to Boost Your Certification Chances
PPTX
Kerberos, NTLM and LM-Hash
PPTX
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
PPTX
SEC599 - Breaking The Kill Chain
PPTX
Jesse Burke RDPwned HackMiami7
PDF
Bsides Tampa Blue Team’s tool dump.
DOC
Introduction to IT
PPTX
Automated detection of stealthy port scans.ppt(mine)
PPTX
Unit-3 frame generation (2).pptx
PPTX
The-Vulnerabldde-Algorithm-Hit-List.pptx
PPTX
Cryptography notes for undergraduate kud
DOCX
secure mining of association rules in horizontally distributed databases
PDF
Is Troy Burning: an overview of targeted trojan attacks
PPT
Snmpv3
PPT
Inside Out Hacking - Bypassing Firewall
PPTX
PPTX
Maximizing Network Efficiency with Large Language Models (LLM)
PDF
CNS_Solutions-Adi.pdf
CMIT 321 QUIZ 3
CMIT 321 QUIZ 4
Top CNSP Exam Dumps to Boost Your Certification Chances
Kerberos, NTLM and LM-Hash
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
SEC599 - Breaking The Kill Chain
Jesse Burke RDPwned HackMiami7
Bsides Tampa Blue Team’s tool dump.
Introduction to IT
Automated detection of stealthy port scans.ppt(mine)
Unit-3 frame generation (2).pptx
The-Vulnerabldde-Algorithm-Hit-List.pptx
Cryptography notes for undergraduate kud
secure mining of association rules in horizontally distributed databases
Is Troy Burning: an overview of targeted trojan attacks
Snmpv3
Inside Out Hacking - Bypassing Firewall
Maximizing Network Efficiency with Large Language Models (LLM)
CNS_Solutions-Adi.pdf
Ad

More from HamesKellor (20)

PDF
CMST 290 FINAL EXAM
PDF
CMST 301 PROJECT 1 CASE STUDY
PDF
CMSC 350 PROJECT 3
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 1
PDF
CMSC 350 FINAL PROJECT
PDF
CMSC 350 HOMEWORK 2
PDF
CMSC 350 HOMEWORK 3
PDF
CMSC 350 HOMEWORK 1
PDF
CMSC 335 HOMEWORK 3
PDF
CMSC 330 PROJECT 1
PDF
CMSC 335 FINAL PROJECT
PDF
CMSC 330 QUIZ 4
PDF
CMIT 425 RISK ASSESSMENT PAPER
PDF
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
PDF
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
PDF
CMIT 370 FINAL EXAM
PDF
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
PDF
CMIT 321 QUIZ 7
CMST 290 FINAL EXAM
CMST 301 PROJECT 1 CASE STUDY
CMSC 350 PROJECT 3
CMSC 350 PROJECT 4
CMSC 350 PROJECT 4
CMSC 350 PROJECT 1
CMSC 350 FINAL PROJECT
CMSC 350 HOMEWORK 2
CMSC 350 HOMEWORK 3
CMSC 350 HOMEWORK 1
CMSC 335 HOMEWORK 3
CMSC 330 PROJECT 1
CMSC 335 FINAL PROJECT
CMSC 330 QUIZ 4
CMIT 425 RISK ASSESSMENT PAPER
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT 370 FINAL EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 321 QUIZ 7

Recently uploaded (20)

PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Cours de Système d'information about ERP.pdf
PDF
Introduction to Generative Engine Optimization (GEO)
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
How to Get Business Funding for Small Business Fast
PDF
Daniels 2024 Inclusive, Sustainable Development
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PDF
How to Get Approval for Business Funding
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PPTX
operations management : demand supply ch
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Cours de Système d'information about ERP.pdf
Introduction to Generative Engine Optimization (GEO)
Slide gioi thieu VietinBank Quy 2 - 2025
How to Get Business Funding for Small Business Fast
Daniels 2024 Inclusive, Sustainable Development
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
How to Get Approval for Business Funding
Tata consultancy services case study shri Sharda college, basrur
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
NEW - FEES STRUCTURES (01-july-2024).pdf
operations management : demand supply ch
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Booking.com The Global AI Sentiment Report 2025
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi

CMIT 321 WEEK 2 QUIZ

  • 1. Buy here: http://theperfecthomework.com/cmit-321-week-2-quiz/ Where is the password file located on the Windows NT/2000 system? Question 1 options: %systemroot%config %systemroot%system32password %systemroot%system32SAM.conf %systemroot%system32config What component makes Kerberos a more secure network authentication system than NTLM or LM authentication schemes? Question 2 options: password policies challenge/response encrypted session keys strong hash algorithm
  • 2. What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.) Question 3 options: They are short. They are converted to lower case. They are converted to upper case. If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters Save Previous PageNext Page In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number. Question 5 options: hybrid nontechnical rule-based precomputed hashes
  • 3. Which of the following Windows Utilities can be utilized to enumerate hosts? Question 6 options: net Use net view net view net stop ______________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault. Question 7 options: Found Scan AppScan CyberCop Scanner Hackshield SNMP uses ___________________ to define the information that a managed system offers. Question 8 options:
  • 4. a) Management Information Bases (MIBs) b) Simple Network Management Protocol c) SNMPUTIL d ) object identifiers Which of the following Management Information Base (MIB) files contains information about server services : Question 9 options:
  • 5. DCHP.MIB HOSTMIB.MIB WINS.MIB LNMIB2.MIB What hidden share can be tested for evidence of null-session vulnerabilities? Question 10 options: ADMIN$ NULL$ C$
  • 6. IPC$ Network Time Protocol (NTP) enumeration commands include (Choose 3)? Question 11 options: Net time ntpda te ntptra ce ntpq Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?
  • 10. It c a n n o t b e d i s a b l e d . The SMTP Protocol provides 3 built in commands, including: Question 13 options: V R F Y
  • 11. E X P N R C P T T O F I N G E R Save Previous PageNext Page The SMTP Protocol provides 3 built in commands, including:
  • 13. Save Previous PageNext Page This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP). Question 20 options: DumpSec Net View Nbtstat enum Save Previous PageNext Page ________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault. Question 7 options: