If a password is seven characters or less, the second half of the LM hash is always
___________________.
You want to search Microsoft Outlook Web Access Default Portal using Google search on the
Internet so that you can perform the brute force attack and get unauthorized access. What search string will you use to accomplish the task?
Which of the following is NOT a valid DNS zone type?
You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?
The employees of CCN Inc. require remote access to the company's proxy servers. In order to provide solid wireless security, the company uses LEAP as the authentication protocol. Which of the following is supported by the LEAP protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following syntaxes is the correct syntax for the master.dbo.sp_makewebtask procedure?
How many bits encryption does SHA-1 use?
Which of the following tasks is NOT performed by antiviruses?
Which protocol would need to be available on a target in order for Nmap to identify services like IMAPS and POP3S?
You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?