- A null input to a hash function produces a null output. (True | False)
- The ____Â effect refers to the cryptographic property where a small change to the input causes a radical change in the output value.Â
- What two design flaws cause a 14-character password stored as an LM hash to be significantly easier to crack?
- Why do we need to define the server challenge when capturing NetNTLMv1?
- What is the predecessor to LLMNR?
- Dictionary rule sets decrease the search space, whereas masks increase the brute-force search space. (True | False)
- What mask would you use to find a five-character password that starts with two digits, then a symbol, and the remaining two characters are uppercase or lowercase letters after QÂ (inclusive) in the alphabet?
- Jack the Ripper is the most popular password cracker. (True | False)
United States
United Kingdom
India
Germany
France
Canada
Russia
Spain
Brazil
Australia
Argentina
Austria
Belgium
Bulgaria
Chile
Colombia
Cyprus
Czechia
Denmark
Ecuador
Egypt
Estonia
Finland
Greece
Hungary
Indonesia
Ireland
Italy
Japan
Latvia
Lithuania
Luxembourg
Malaysia
Malta
Mexico
Netherlands
New Zealand
Norway
Philippines
Poland
Portugal
Romania
Singapore
Slovakia
Slovenia
South Africa
South Korea
Sweden
Switzerland
Taiwan
Thailand
Turkey
Ukraine