1. Right Answer: C
Explanation: Responder, Metasploit-s SMB capture mode, and Wireshark can capture SMB hashes from broadcasts. This capability is not built in Impacket but a wide range of related tools is provided that includes the ability to authenticate the hashes once you have captured them..
2. Right Answer: B
Explanation: For a given set of password rules, rainbow tables are lists of pre-computed hashes for all possible passwords. Hashes are compared to the previously calculated hashes in a Rainbow table that match with the known password values. A relatively fast databaseLookup allows this to happen, allowing fast -crackingΓΒ of hashed passwords, in spite the fact that hashes are not reversible.
3. Right Answer: C
Explanation: A fake-AP functionality is built in Aircrack-NG, valid access points are identified with this tool, a target system is disassociated, cloned, and then acted as a man in the middle for future traffi
4. Right Answer: B
Explanation: The results of vulnerability scans are likely to be effected by the encryption technology as the services exposed by a system is not changed in it. Inbound scanning traffic, before it reaches target systems, may be blocked by Firewalls and intrusion prevention systems. External scanners are prevented from seeing services exposed within the
5. Right Answer: A
Explanation: Sqlmap is a dedicated database vulnerability scanner and is the most appropriate tool to be used in this scenario. Ryan might discover the same vulnerabilities using the general-purpose Nessus or OpenVAS scanners, but they are not dedicated database vulnerability scanning tools. Nikto is a web application vulnerability scanner.