Page 788 - StudyBook.pdf
P. 788
772 Appendix • Self Test Appendix
10. Which password attack will take the longest to crack a password?
A. Password guessing
B. Brute force attack
C. Dictionary attack
D. All attacks are equally fast
B. Brute force tries most if not all combinations, so it takes the longest time.
A. Password guessing can be the fastest if correct guesses are used. C. A dictionary attack, if
successful, only uses a very finite amount of tries. D. Certainly different methods have different
speeds.
11. What are some of the advantages of off-line password attacks? (Select all that apply.)
A. They do not generate noise on the target network or host.
B. They are not locked out after a set amount of tries.
C. They can be used to reset the user’s password without the need for cracking.
D. They can be initiated by zombies.
A and B. Offline attacks are done on the cracker’s machine, and so do not generate noise on
the target network, and are not subject to account lock-outs.
C. Password attacks cannot reset a users password, which would require write access to the
password database, which is unlikely. D. Zombies take part in DDoS attack, not password
attacks.
12. Your machine was infected by a particularly destructive virus. Luckily, you have backups of
your data.Which of the following should you do first?
A. Restore the data from the backups.
B. Scan the data from the backups for virus infection.
C. Use the installed anti-virus program to scan and disinfect your machine.
D. Boot from an anti-virus CD or floppy to scan and disinfect your machine.
D. The first thing after being infected is to use a clean boot disk, CD, or floppy, to run a clean
antivirus on the machine to be sure it can be disinfected.
A. Restoring the data from the backups can lead to it being re-infected unless you have
cleaned the machine. B. Scanning the backup for virus without cleaning the machine is useless,
since the active virus can affect the scan results. C. Scanning the machine from the installed
anti-virus is useless, since the active virus can affect the scan results.
13. Because of their prevalence, phishing protection is offered in many products.Which of the
following offer built-in phishing protection? (Select all that apply.)
www.syngress.com