312-49v10 Exam Question 141
Which type of attack is possible when attackers know some credible information about the victim's password, such as the password length, algorithms involved, or the strings and characters used in its creation?
312-49v10 Exam Question 142
Which of the following file formats allows the user to compress the acquired data as well as keep it randomly accessible?
312-49v10 Exam Question 143
Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?
22,164 cylinders/disk
80 heads/cylinder
63 sectors/track
22,164 cylinders/disk
80 heads/cylinder
63 sectors/track
312-49v10 Exam Question 144
Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?
312-49v10 Exam Question 145
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?
