Network+ N10-008 ALL IN ONE EXAMBANK (Questions and Answers) ACCURATE AND VERIFIED.An attack where someone tries to hack a password using every possible
password permutation is called what?
A. Man-in-the-middle
B. Spoofing
C. Rainbow table
D. Brute force
Verified Answer -Brute force uses every possible permutation and is often
used in password cracking.
Which Windows utility displays open ports on a host?
A. netstat
B. ping
C. ipconfig
D. nbtstat
Verified Answer -Only netstat shows all open ports on a Windows system.
Which of the following protocols are notorious for cleartext passwords?
(Select two.)
A. SSH
B. Telnet
C. HTTPS
D. POP3
Verified Answer -Both Telnet and POP3 use cleartext passwords.
The NSA's TEMPEST security standards are used to combat which risk?
A. RF emanation
B. Spoofing
C. DDoS
D. Malware
Verified Answer -TEMPEST is designed to reduce RF emanation using
enclosures, shielding, and even paint.
Category | Study Material |
Comments | 0 |
Rating | |
Sales | 0 |