Which of the following can hackers use to gain access to a system over the network without knowing the actual password?
A. User enumeration
B. Pass the hash
C. Port scanning
D. Password cracking
Answer: B
A Windows system user reports seeing a command prompt window pop up briefly during each login. In which of the following locations would an incident responder check to explain this activity?
A. rc.d
B. HKLM “RunOnce” key
C. c:\temp
D. /etc/init.d/
Answer: C