Hacking
Network Security
Authentication
Encryption
100

What are the four types of attacks?

Passive Online, Active Online, Offline Attacks, Non-Electric Attacks

100

What are the three A's in AAA security?

Authentication, Authorization, Auditing

100

LM hashes are more secure than NTLM hashes... (True or False)

False

100

What does EFS stand for?

Encrypting File System

200

What type of attack is defined by an attacker altering/relaying information in the packets between communication of two users?

Man-in-the-Middle Attack

200

What are the three fundamentals of security?

Confidentiality, Integrity, Availability

200

In Kerberos, what controls the access to getting tickets to server/network resources?

Key Distribution Cener (KDC)

200

Can your private key be deleted when using EFS encryption?

Yes

300

What are the three types of DNS queries?

Forward Lookup Brute Force, Reverse Lookup Brute Force, Zone Transfer

300

What are the three types of security policies?

Administrative, Physical, Technical

300

When a password is lost, which Database should you run against a password cracker?

SAM or Security Accounts Manager

300

Transport Layer Security Involves which 3 steps?

Peer Negotiation, Key Exchange, Symmetric Cipher Encryption

400

When using Kali to crack a password, what type of table is needed to be extracted and loaded in OPH Crack?

Rainbow

400

What are the five steps of MSF?

Envisioning, Planning, Developing, Stabilizing, Deploying

400

In RSA, what are the two factors that the authentication is based on?

PIN/Password, Authenticator

400

Who is the designated Recovery Agent in the domain?

Administrative Account

500

What are the six anatomical steps to an attack?

Reconnaissance, Deeper Reconnaissance, Plan, Implement, Consolidate, Cover Up Tracks

500

Which service allows authentication to be moved as a centralized location?

RADIUS or Remote Access Dial in User Service

500

What is the side effect of password salting?

Defeats pre-computed hash attacks.

500

How many bits are needed to encrypt the Network Security policies?

128 bits