Execute an Offline Password Attack in Linux
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of the shadow file in the context of password cracking?
To store encryption keys
To store user data
To store system logs
To store password hashes
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which option in Hashcat specifies the type of hash you are trying to crack?
O option
H option
A option
M option
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the hash type number for SHA-512 in Unix systems?
1000
1800
512
256
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack mode in Hashcat is used for a dictionary attack?
Combination
Brute force
Hybrid
Straight
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if Hashcat does not start cracking due to a wrong hash type?
Increase the processing power
Use a different word list
Check the hash type and correct it
Restart the application
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can help identify the type of hash you are dealing with?
Password manager
Hash identifier
Encryption decoder
Hash converter
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you check the progress of the cracking process in Hashcat?
By pressing R
By pressing S
By pressing P
By pressing T
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
6 questions
Web Security: Common Vulnerabilities And Their Mitigation - Broken authentication and session management
Interactive video
•
University
6 questions
Web API Development with Flask (Video 1)
Interactive video
•
University
6 questions
Web Security: Common Vulnerabilities And Their Mitigation - Getting PHP and MySQL to talk to each other (Mac)
Interactive video
•
University
6 questions
Browsing the Internet Safely
Interactive video
•
University
6 questions
Complete Git Guide: Understand and Master Git and GitHub - Forking Repository
Interactive video
•
University
6 questions
Botnets and How They Work
Interactive video
•
University
6 questions
Password Tools and Tips
Interactive video
•
University
6 questions
Twitter Says Some Personal Info May Have Been Misused For Ad Targeting
Interactive video
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Holiday Trivia
Quiz
•
9th Grade - University
15 questions
Holiday Movies
Quiz
•
University
14 questions
Christmas Trivia
Quiz
•
3rd Grade - University
20 questions
Christmas Trivia
Quiz
•
University
8 questions
5th, Unit 4, Lesson 8
Lesson
•
KG - Professional Dev...
20 questions
Disney Trivia
Quiz
•
University