Question
1.____ involves making active connections to the target system or subjecting it to direct queries.
a. Privilege escalation
b. Application execution
c. Trace hiding
d. Enumeration

2.A(n) ____ is basically a pseudoaccount that has no username or password, but can be used to access certain information on the network.
a. null user
b. empty session
c. default user
d. blank session

3.____ tokens cache information about a logon session for a particular user and remain valid until the user logs out or uses another machine to access the particular resource.
a. User
b. Session
c. Access
d. Login

4.A(n) ____ share is a hidden share that allows communication between two processes on the same system.
a. SMC
b. IPC
c. EPC
d. SMB

5.Null sessions require access to TCP port ____.
a. 139
b. 141
c. 345
d. 349

6.A ____, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents.
a. sniffer
b. recorder
c. logger
d. tapper

7.____ hashes are a legacy method used by Microsoft Windows to store passwords of less than 15 characters in two five-character hashes.
a. UM (User Manager)
b. Shadow
c. LM (LAN Manager)
d. LT (Lite Token)

8.A ____ attack is a combination of both the brute force attack and the dictionary attack.
a. hybrid
b. syllable
c. passive
d. rainbow

9.____ is designed to explore the NetBIOS file-sharing services the target system offers.
a. Smbbf
b. L0phtCrack
c. SMBCrack
d. NAT

10.____ is a network authentication system used by Microsoft to allow individuals communicating over a nonsecure network to prove their identity to one another in a secure manner by logging on to the system only one time and then using a ticket system to access resources and applications.
a. SMB
b. NetBIOS
c. Kerberos
d. NTLMv2

11.A ____ is an attempt to simulate methods that intruders use to gain unauthorized access to an organization’s networked systems and then compromise them.
a. security audit
b. security assessment
c. penetration test
d. vulnerability assessment

12.____ are evaluations of a network’s vulnerability to attack through a variety of means.
a. Security assessments
b. Penetration tests
c. Security audits
d. Vulnerability assessments

13.IT ____ are designed to evaluate an organization’s security policies and procedures.
a. ping sweeps
b. vulnerability assessments
c. penetration tests
d. security audits

14.A(n) ____ is a company’s in-house monitor over the course of the pen-test.
a. D-I-Y audit
b. cutout
c. internal monitor
d. self-audit

15.The contract agreement that describes the terms of service that an outsourcer provides is known as a ____.
a. service level agreement (SLA)
b. rule of engagement
c. due contract
d. project scope
Solution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references.
Students may use these solutions for personal skill-building and practice.
Unethical use is strictly forbidden.

This is only a preview of the solution.
Please use the purchase button to see the entire solution.
By purchasing this solution you'll be able to access the following files:
Solution.docx
Purchase Solution
$10.00
Google Pay
Amazon
Paypal
Mastercard
Visacard
Discover
Amex
View Available IT Computer Support Services Tutors 641 tutors matched
Ionut
(ionut)
Master of Computer Science
Hi! MSc Applied Informatics & Computer Science Engineer. Practical experience in many CS & IT branches.Research work & homework
5/5 (6,804+ sessions)
1 hour avg response
$15-$50 hourly rate
Pranay
(math1983)
Doctor of Philosophy (PhD)
Ph.D. in mathematics and working as an Assistant Professor in University. I can provide help in mathematics, statistics and allied areas.
4.6/5 (6,687+ sessions)
1 hour avg response
$40-$50 hourly rate
Leo
(Leo)
Doctor of Philosophy (PhD)
Hi! I have been a professor in New York and taught in a math department and in an applied math department.
4.9/5 (6,433+ sessions)
2 hours avg response

Similar Homework Solutions