
Execute an Offline Password Attack in Linux
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of the shadow file in the context of password cracking?
To store encryption keys
To store user data
To store system logs
To store password hashes
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which option in Hashcat specifies the type of hash you are trying to crack?
O option
H option
A option
M option
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the hash type number for SHA-512 in Unix systems?
1000
1800
512
256
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack mode in Hashcat is used for a dictionary attack?
Combination
Brute force
Hybrid
Straight
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if Hashcat does not start cracking due to a wrong hash type?
Increase the processing power
Use a different word list
Check the hash type and correct it
Restart the application
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can help identify the type of hash you are dealing with?
Password manager
Hash identifier
Encryption decoder
Hash converter
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you check the progress of the cracking process in Hashcat?
By pressing R
By pressing S
By pressing P
By pressing T
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?