<< Prev Question Next Question >>

Question 98/132

An administrator has enabled salting for users' passwords on a UNIX box. A penetration tester must attempt to retrieve password hashes. Which of the following files must the penetration tester use to eventually obtain passwords on the system? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (132q)
Question 1: A company decides to purchase commercially available softwar...
Question 2: The security engineer receives an incident ticket from the h...
Question 3: A network engineer wants to deploy user-based authentication...
Question 4: A user is suspected of engaging in potentially illegal activ...
Question 5: A critical system audit shows that the payroll system is not...
Question 6: An internal development team has migrated away from Waterfal...
Question 7: An accountant at a small business is trying to understand th...
Question 8: A company Chief Information Officer (CIO) is unsure which se...
Question 9: A large company is preparing to merge with a smaller company...
Question 10: The telecommunications manager wants to improve the process ...
Question 11: Since the implementation of IPv6 on the company network, the...
Question 12: Ann is testing the robustness of a marketing website through...
Question 13: It has come to the IT administrator's attention that the "po...
Question 14: A Chief Financial Officer (CFO) has raised concerns with the...
Question 15: A company provides on-demand cloud computing resources for a...
Question 16: A company has a difficult time communicating between the sec...
Question 17: An IT manager is working with a project manager to implement...
Question 18: A company has decided to change its current business directi...
Question 19: An organization has several production critical SCADA superv...
Question 20: A project manager working for a large city government is req...
Question 21: There have been some failures of the company's internal faci...
Question 22: A vulnerability scanner report shows that a client-server ho...
Question 23: An IT auditor is reviewing the data classification for a sen...
Question 24: A company is in the process of implementing a new front end ...
Question 25: An IT manager is concerned about the cost of implementing a ...
Question 26: Which of the following technologies prevents an unauthorized...
Question 27: A web services company is planning a one-time high-profile e...
Question 28: A company that must comply with regulations is searching for...
Question 29: A security administrator is tasked with increasing the avail...
Question 30: A small company's Chief Executive Officer (CEO) has asked it...
Question 31: A senior network security engineer has been tasked to decrea...
Question 32: A security manager is looking into the following vendor prop...
Question 33: A security administrator was recently hired in a start-up co...
Question 34: A system administrator has just installed a new Linux distri...
Question 35: An investigator wants to collect the most volatile data firs...
Question 36: A security manager looked at various logs while investigatin...
Question 37: Which of the following would be used in forensic analysis of...
Question 38: An IT manager is working with a project manager from another...
Question 39: A network administrator with a company's NSP has received a ...
Question 40: Company policy requires that all company laptops meet the fo...
Question 41: A web developer is responsible for a simple web application ...
Question 42: A facilities manager has observed varying electric use on th...
Question 43: Using SSL, an administrator wishes to secure public facing s...
Question 44: A new IT company has hired a security consultant to implemen...
Question 45: The IT Security Analyst for a small organization is working ...
Question 46: A storage as a service company implements both encryption at...
Question 47: A security administrator is assessing a new application. The...
Question 48: A company has noticed recently that its corporate informatio...
Question 49: The Chief Executive Officer (CEO) of an Internet service pro...
Question 50: A company is trying to decide how to manage hosts in a branc...
Question 51: SIMULATION Company A has noticed abnormal behavior targeting...
Question 52: The network administrator at an enterprise reported a large ...
Question 53: An organization has implemented an Agile development process...
Question 54: The Chief Information Security Officer (CISO) is asking for ...
Question 55: An administrator believes that the web servers are being flo...
Question 56: A security administrator has been asked to select a cryptogr...
Question 57: ABC Company must achieve compliance for PCI and SOX. Which o...
Question 58: A software developer and IT administrator are focused on imp...
Question 59: A medical device manufacturer has decided to work with anoth...
Question 60: Wireless users are reporting issues with the company's video...
Question 61: VPN users cannot access the active FTP server through the ro...
Question 62: Due to compliance regulations, a company requires a yearly p...
Question 63: A Chief Information Security Officer (CISO) has requested th...
Question 64: An IT Manager is concerned about errors made during the depl...
Question 65: A new web based application has been developed and deployed ...
Question 66: A new internal network segmentation solution will be impleme...
Question 67: A security analyst, Ann, states that she believes Internet f...
Question 68: During a new desktop refresh, all hosts are hardened at the ...
Question 69: An information security assessor for an organization finishe...
Question 70: The Information Security Officer (ISO) is reviewing a summar...
Question 71: A security administrator is performing VDI traffic data coll...
Question 72: Which of the following activities is commonly deemed "OUT OF...
Question 73: An enterprise must ensure that all devices that connect to i...
Question 74: SIMULATION An administrator wants to install a patch to an a...
Question 75: A risk manager has decided to use likelihood and consequence...
Question 76: A recently hired security administrator is advising develope...
Question 77: After the install process, a software application executed a...
Question 78: An administrator wishes to replace a legacy clinical softwar...
Question 79: A penetration tester is inspecting traffic on a new mobile b...
Question 80: An organization uses IP address block 203.0.113.0/24 on its ...
Question 81: An external penetration tester compromised one of the client...
Question 82: Joe, a penetration tester, is tasked with testing the securi...
Question 83: A firm's Chief Executive Officer (CEO) is concerned that IT ...
Question 84: The DLP solution has been showing some unidentified encrypte...
Question 85: A security administrator has noticed that an increased numbe...
Question 86: A finance manager says that the company needs to ensure that...
Question 87: A multi-national company has a highly mobile workforce and m...
Question 88: A trucking company delivers products all over the country. T...
Question 89: An administrator is implementing a new network-based storage...
Question 90: The latest independent research shows that cyber attacks inv...
Question 91: An employee is performing a review of the organization's sec...
Question 92: A security services company is scoping a proposal with a cli...
Question 93: Company policy requires that all unsupported operating syste...
Question 94: A port in a fibre channel switch failed, causing a costly do...
Question 95: The risk manager at a small bank wants to use quantitative a...
Question 96: The following has been discovered in an internally developed...
Question 97: A system worth $100,000 has an exposure factor of eight perc...
Question 98: An administrator has enabled salting for users' passwords on...
Question 99: A bank is in the process of developing a new mobile applicat...
Question 100: ODBC access to a database on a network-connected host is req...
Question 101: Company ABC is hiring customer service representatives from ...
Question 102: A security solutions architect has argued consistently to im...
Question 103: SIMULATION Compliance with company policy requires a quarter...
Question 104: A well-known retailer has experienced a massive credit card ...
Question 105: A pentester must attempt to crack passwords on a windows dom...
Question 106: ABC Corporation has introduced token-based authentication to...
Question 107: A security tester is testing a website and performs the foll...
Question 108: An international shipping company discovered that deliveries...
Question 109: Company XYZ finds itself using more cloud-based business too...
Question 110: A bank has decided to outsource some existing IT functions a...
Question 111: A security consultant is conducting a network assessment and...
Question 112: An organization recently upgraded its wireless infrastructur...
Question 113: The Chief Executive Officer (CEO) of a small start-up compan...
Question 114: A security administrator wants to calculate the ROI of a sec...
Question 115: A small company is developing a new Internet-facing web appl...
Question 116: ABC Corporation uses multiple security zones to protect syst...
Question 117: The Information Security Officer (ISO) believes that the com...
Question 118: Company XYZ has purchased and is now deploying a new HTML5 a...
Question 119: A security firm is writing a response to an RFP from a custo...
Question 120: A company has adopted a BYOD program. The company would like...
Question 121: An educational institution would like to make computer labs ...
Question 122: A company with 2000 workstations is considering purchasing a...
Question 123: Joe is a security architect who is tasked with choosing a ne...
Question 124: A security administrator notices a recent increase in workst...
Question 125: A security auditor suspects two employees of having devised ...
Question 126: A human resources manager at a software development company ...
Question 127: News outlets are beginning to report on a number of retail e...
Question 128: An insurance company has an online quoting system for insura...
Question 129: The IT director has charged the company helpdesk with saniti...
Question 130: The finance department for an online shopping website has di...
Question 131: After reviewing a company's NAS configuration and file syste...
Question 132: A security architect has been engaged during the implementat...