Review Questions 175
- An attacker can use a(n) to return to a system.
A. Backdoor
B. Cracker
C. Account
D. Service
- A is used to store a password.
A. NULL session
B. Hash
C. Rainbow table
D. Rootkit
- A is a file used to store passwords.
A. Network
B. SAM
C. Database
D. NetBIOS
- A is a hash used to store passwords.
A. LM
B. SSL
C. SAM
D. LMv2
- is used to partially encrypt the SAM.
A. SYSKEY
B. SAM
C. NTLM
D. LM
- Which system should be used instead of LM or NTLM?
A. NTLMv2
B. SSL
C. Kerberos
D. LM