
EH 8.1.15
Authored by Nicole Nitschke
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have just run the John the Ripper command shown in the image. Which of the following was this command used for?
To extract the password and save it in the secure.txt file.
To extract the password and save it in a rainbow table named secure.txt.
To extract the password from a rainbow hash and save it in the secure.txt file.
To extract the password hashes and save them in the secure.txt file.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password.
Which of the following types of non-technical password attack has occurred?
Shoulder surfing
Social engineering
Dumpster diving
Password guessing
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it.
Which type of non-technical password attacks have you enabled?
(a)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes shoulder surfing?
Someone nearby watches you enter your password on your computer and records it.
Finding someone's password in the trash can and using it to access their account.
Giving someone you trust your username and account password.
Guessing someone's password because it is so common or simple.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?
Password salting
Pass the hash
Keylogging
Password sniffing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
[ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~] are the possible values in which of the following hash types?
Mix alpha-numeric
Ascii-32-95
Alpha-numeric-symbol32-space
Ascii-32-65-123-4
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following includes all possible characters or values for plaintext?
table_index
chain_num
charset
chain_len
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?