1. Right Answer: B
Explanation: There is no support for encryption in version 1 & 2 SNMPv3 supports both encryption (DES) and hashing (MD5 or SHA).
2. Right Answer: A
Explanation: In the dictionary attack to perform password cracking, a password cracking application is used along with a dictionary file. This dictionary file contains entire dictionary or list of known & common words to attempt password recovery. This is the simplest type of password cracking, and usually, systems are not vulnerable to dictionary attacks if they use strong, unique and alphanumeric passwords.
3. Right Answer: C
Explanation: Brute Force attack attempts to recover the password by trying every possible combination of characters. Each combination pattern is attempted until the password is accepte Brute forcing is a common, and basic technique to uncover passwor
4. Right Answer: A
Explanation: Metasploit Framework enables you to automate the process of discovery and exploitation and provides you with the necessary tools to perform the manual testing phase of a penetration test. You can use Metasploit Pro to scan for open ports and services, exploit vulnerabilities, pivot further into a network, collect evidence, and create a report of the test results.
5. Right Answer: C
Explanation: Every possible combination of character is computed for the hash to create a rainbow table. When a rainbow table contains all possible pre-computed hashes, an attacker may capture the password hash of target and compare it with the rainbow table.