Tuesday 1 October 2019

Logical Operations CFR-210 Question Answer

Which of the following can hackers use to gain access to a system over the network without knowing the actual password?

A. User enumeration
B. Pass the hash
C. Port scanning
D. Password cracking

Answer: B


A Windows system user reports seeing a command prompt window pop up briefly during each login. In which of the following locations would an incident responder check to explain this activity?


A. rc.d
B. HKLM “RunOnce” key
C. c:\temp
D. /etc/init.d/

Answer: C