Page 788 - StudyBook.pdf
P. 788

772    Appendix • Self Test Appendix

              10. Which password attack will take the longest to crack a password?
                  A. Password guessing
                  B. Brute force attack
                  C. Dictionary attack
                  D. All attacks are equally fast
              B. Brute force tries most if not all combinations, so it takes the longest time.
              A. Password guessing can be the fastest if correct guesses are used. C. A dictionary attack, if
                 successful, only uses a very finite amount of tries. D. Certainly different methods have different
                 speeds.

              11. What are some of the advantages of off-line password attacks? (Select all that apply.)
                  A. They do not generate noise on the target network or host.
                  B. They are not locked out after a set amount of tries.
                  C. They can be used to reset the user’s password without the need for cracking.
                  D. They can be initiated by zombies.
              A and B. Offline attacks are done on the cracker’s machine, and so do not generate noise on
                 the target network, and are not subject to account lock-outs.
              C. Password attacks cannot reset a users password, which would require write access to the
                 password database, which is unlikely. D. Zombies take part in DDoS attack, not password
                 attacks.

              12. Your machine was infected by a particularly destructive virus. Luckily, you have backups of
                  your data.Which of the following should you do first?
                  A. Restore the data from the backups.
                  B. Scan the data from the backups for virus infection.
                  C. Use the installed anti-virus program to scan and disinfect your machine.
                  D. Boot from an anti-virus CD or floppy to scan and disinfect your machine.
              D. The first thing after being infected is to use a clean boot disk, CD, or floppy, to run a clean
                 antivirus on the machine to be sure it can be disinfected.
              A. Restoring the data from the backups can lead to it being re-infected unless you have
                 cleaned the machine. B. Scanning the backup for virus without cleaning the machine is useless,
                 since the active virus can affect the scan results. C. Scanning the machine from the installed
                 anti-virus is useless, since the active virus can affect the scan results.

              13. Because of their prevalence, phishing protection is offered in many products.Which of the
                  following offer built-in phishing protection? (Select all that apply.)









          www.syngress.com
   783   784   785   786   787   788   789   790   791   792   793