1. Which one of the following is a unique set of technologies, services, and rights to help you deploy, manage, and use your Microsoft products more effectively?
A) Software Assurance
B) Forensics
C) Persistence
D) Configuration Compliance
2. An hping command is used to send traffic to a remote system as Hping remotesite.com -S -V -p 80, what will be the traffic seen by a remote system?
A) A TCP three-way handshake to TCP port 80
B) TCP SYNs to TCP port 80
C) HTTP traffic to TCP port 80
D) HTTPS traffic to TCP port 80
3. A system was accessed by a user to gather more information about other hosts in its local subnet. The user intends to perform a port scan but is not able to install other tools to do so. Which one of the tools given is not usable as a port scanner?
A) Netcat
B) Hping
C) ExifTool
D) Telnet
4. Against a hashed password file User wants to run John the Ripper. To successfully crack the file, what information does she need to know?
A) The number of passwords
B) The hash used
C) A sample word list
D) None of the above
5. A list of valid user accounts has been acquired by Lauren but she does not have passwords for them. Not having found any vulnerabilities, the targeting organization is believed to have a poor password practice. What could be the type of attack she uses in order to gain access to a target system where those usernames are likely valid?
A) Thesaurus Attacks
B) Rainbow Tables
C) Meterpreter
D) Dictionary Attacks