* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
D. Netbus E. John the Ripper Correct Answer: AE Section: (none) Explanation Explanation/Reference: Explanation: L0phtcrack and John the Ripper are two well know password-cracking programs. Netcat is considered the Swiss-army knife of hacking tools,but is not used for password cracking QUESTION 646 Password cracking programs reverse the hashing process to recover passwords.(True/False. A. True B. False Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: Password cracking programs do not reverse the hashing process. Hashing is a one- way process. What these programs can do is to encrypt words,phrases,and characters using the same encryption process and compare them to the original password. A hashed match reveals the true password. QUESTION 647 While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective? A. B. C. D. E. Block port 25 at the firewall. Shut off the SMTP service on the server. Force all connections to use a username and password. Switch from Windows Exchange to UNIX Sendmail. None of the above. Correct Answer: E Section: (none) Explanation Explanation/Reference: Explanation: Blocking port 25 in the firewall or forcing all connections to use username and password would have the consequences that the server is unable to communicate with other SMTP servers. Turning of the SMTP service would disable the email function completely. All email servers use SMTP to communicate with other email servers and therefore changing email server will not help. QUESTION 648 Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three) A. B. C. D. Converts passwords to uppercase. Hashes are sent in clear text over the network. Makes use of only 32 bit encryption. Effective length is 7 characters.