02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

176 Chapter 7 ■ Gaining Access to a System<br />

13. NTLM provides what benefit versus LM?<br />

A. Performance<br />

B. Security<br />

C. Mutual authentication<br />

D. SSL<br />

14. ADS requires what to be present?<br />

A. SAM<br />

B. Domain<br />

C. NTFS<br />

D. FAT<br />

15. What utility may be used to stop auditing or logging of events?<br />

A. ADS<br />

B. LM<br />

C. NTFS<br />

D. Auditpol<br />

16. On newer Windows systems, what hashing mechanism is disabled?<br />

A. Kerberos<br />

B. LM<br />

C. NTLM<br />

D. NTLMv2<br />

17. Which is a utility used to reset passwords?<br />

A. TRK<br />

B. ERC<br />

C. WinRT<br />

D. IRD<br />

18. A good defense against password guessing is .<br />

A. Complex passwords<br />

B. Password policy<br />

C. Fingerprints<br />

D. Use of NTLM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!