Search Header Logo

EH 8.1.15

Authored by Nicole Nitschke

Other

12th Grade

Used 1+ times

EH 8.1.15
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

You have just run the John the Ripper command shown in the image. Which of the following was this command used for?

To extract the password and save it in the secure.txt file.

To extract the password and save it in a rainbow table named secure.txt.

To extract the password from a rainbow hash and save it in the secure.txt file.

To extract the password hashes and save them in the secure.txt file.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password.

Which of the following types of non-technical password attack has occurred?

Shoulder surfing

Social engineering

Dumpster diving

Password guessing

3.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. 

Which type of non-technical password attacks have you enabled?

(a)  

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes shoulder surfing?

Someone nearby watches you enter your password on your computer and records it.

Finding someone's password in the trash can and using it to access their account.

Giving someone you trust your username and account password.

Guessing someone's password because it is so common or simple.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash? 

Password salting

Pass the hash

Keylogging

Password sniffing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

[ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~] are the possible values in which of the following hash types?

Mix alpha-numeric

Ascii-32-95

Alpha-numeric-symbol32-space

Ascii-32-65-123-4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following includes all possible characters or values for plaintext?

table_index

chain_num

charset

chain_len

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?