312-49v10 Exam Question 141

Which type of attack is possible when attackers know some credible information about the victim's password, such as the password length, algorithms involved, or the strings and characters used in its creation?
  • 312-49v10 Exam Question 142

    Which of the following file formats allows the user to compress the acquired data as well as keep it randomly accessible?
  • 312-49v10 Exam Question 143

    Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?
    22,164 cylinders/disk
    80 heads/cylinder
    63 sectors/track
  • 312-49v10 Exam Question 144

    Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?
  • 312-49v10 Exam Question 145

    You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?