ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

symmetric algorithms
symmetric algorithms
asymmetric algorithms
asymmetric algorithms
hashing algorithms
hashing algorithms
integrity algorithms
integrity algorithms
Suggested answer: C
asked 18/09/2024
Jesserey Joseph
44 questions

Question 2

Report Export Collapse

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

There is a NIDS present on that segment.
There is a NIDS present on that segment.
Kerberos is preventing it.
Kerberos is preventing it.
Windows logons cannot be sniffed.
Windows logons cannot be sniffed.
L0phtcrack only sniffs logons to web servers.
L0phtcrack only sniffs logons to web servers.
Suggested answer: B
Explanation:

Topic 2, Exam Pool B

asked 18/09/2024
ELVIS KENVO
42 questions

Question 3

Report Export Collapse

You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force hacking tool for decryption. What encryption algorithm will you be decrypting?

MD4
MD4
DES
DES
SHA
SHA
SSL
SSL
Suggested answer: B
asked 18/09/2024
laurence peterson
42 questions

Question 4

Report Export Collapse

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

Full Blown
Full Blown
Thorough
Thorough
Hybrid
Hybrid
BruteDics
BruteDics
Suggested answer: C
asked 18/09/2024
Olusola Adebayo
44 questions

Question 5

Report Export Collapse

What is the algorithm used by LM for Windows2000 SAM?

MD4
MD4
DES
DES
SHA
SHA
SSL
SSL
Suggested answer: B
asked 18/09/2024
Adam Burdett
31 questions

Question 6

Report Export Collapse

E-mail scams and mail fraud are regulated by which of the following?

18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers
18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers
18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices
18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices
18 U.S.C. par. 1362 Communication Lines, Stations, or Systems
18 U.S.C. par. 1362 Communication Lines, Stations, or Systems
18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication
18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication
Suggested answer: A
asked 18/09/2024
Mehr Khan
37 questions

Question 7

Report Export Collapse

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

BA810DBA98995F1817306D272A9441BB
BA810DBA98995F1817306D272A9441BB
44EFCE164AB921CQAAD3B435B51404EE
44EFCE164AB921CQAAD3B435B51404EE
0182BD0BD4444BF836077A718CCDF409
0182BD0BD4444BF836077A718CCDF409
CEC52EB9C8E3455DC2265B23734E0DAC
CEC52EB9C8E3455DC2265B23734E0DAC
B757BF5C0D87772FAAD3B435B51404EE
B757BF5C0D87772FAAD3B435B51404EE
E52CAC67419A9A224A3B108F3FA6CB6D
E52CAC67419A9A224A3B108F3FA6CB6D
Suggested answer: B, E
asked 18/09/2024
Kefash White
38 questions

Question 8

Report Export Collapse

Which of the following is the primary objective of a rootkit?

It opens a port to provide an unauthorized service
It opens a port to provide an unauthorized service
It creates a buffer overflow
It creates a buffer overflow
It replaces legitimate programs
It replaces legitimate programs
It provides an undocumented opening in a program
It provides an undocumented opening in a program
Suggested answer: C
asked 18/09/2024
Sam Krupesh
38 questions

Question 9

Report Export Collapse

This kind of password cracking method uses word lists in combination with numbers and special characters:

Hybrid
Hybrid
Linear
Linear
Symmetric
Symmetric
Brute Force
Brute Force
Suggested answer: A
asked 18/09/2024
isaac linares
26 questions

Question 10

Report Export Collapse

_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

Trojan
Trojan
RootKit
RootKit
DoS tool
DoS tool
Scanner
Scanner
Backdoor
Backdoor
Suggested answer: B
asked 18/09/2024
Mina Shaker
45 questions
Total 573 questions
Go to page: of 58

Related questions