Which type of password attack makes use of extensive wordlists to hash
and run against a captured password hash?
A. Character
B. Brute Force
C. Rainbow Tables
D. Dictionary
Which of the following refers to an attacker exploiting vulnerabilities before the vendor has a
patch or mitigation for them?
A. Day 1 attack
B. Zero-day attack
C. Exploit
D. Category I attack
Note: Consulting any additional resources constitutes a lack of integrity...
Malicious software collecting information about users without their knowledge/consent is known as
A. Crypto-malware
B. Ransomware
C. Adware
D. Spyware
Note: Use of a search engine, or any other resources is prohibited!!!
I'm going to make some statements, and I would like for you
to simply indicate whether you AGREE or DISAGREE. If you
AGREE, keep it movin'. If you DISAGREE, share with me why,
if you don't mind. If you neither AGREE or DISAGREE, you
can indicate that you have no opinion (or none of my business...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.