0 of 10 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Knowledge-based authentication is considered the weakest because it relies on information that can often be guessed or stolen.
Password hashes on non-domain controllers are stored in the Sam database.
A birthday attack occurs when two inputs produce the same hash output, exploiting hash collisions.
Challenge handshake authentication uses a unique challenge string to prevent replay attacks.
Root privileges are needed to access and unshadow the password file in Linux.
Brute force attack involves testing all possible combinations in a systematic order.
Kerberos is more secure because it encrypts unknowns with unknowns, making it harder to crack.
Cleartext passwords can be intercepted by attackers, making them highly insecure over networks.
Mimikatz is a tool that can perform ‘pass the hash’ attacks and other credential-based exploits.
Salting ensures each hash is unique, even for identical passwords, preventing rainbow table attacks.
