ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers

Question list
Search
Search

Related questions











Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

A.
symmetric algorithms
A.
symmetric algorithms
Answers
B.
asymmetric algorithms
B.
asymmetric algorithms
Answers
C.
hashing algorithms
C.
hashing algorithms
Answers
D.
integrity algorithms
D.
integrity algorithms
Answers
Suggested answer: C

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

A.
There is a NIDS present on that segment.
A.
There is a NIDS present on that segment.
Answers
B.
Kerberos is preventing it.
B.
Kerberos is preventing it.
Answers
C.
Windows logons cannot be sniffed.
C.
Windows logons cannot be sniffed.
Answers
D.
L0phtcrack only sniffs logons to web servers.
D.
L0phtcrack only sniffs logons to web servers.
Answers
Suggested answer: B

Explanation:

Topic 2, Exam Pool B

You are attempting to crack LM Manager hashed from Windows 2000 SAM file. You will be using LM Brute force hacking tool for decryption. What encryption algorithm will you be decrypting?

A.
MD4
A.
MD4
Answers
B.
DES
B.
DES
Answers
C.
SHA
C.
SHA
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: B

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

A.
Full Blown
A.
Full Blown
Answers
B.
Thorough
B.
Thorough
Answers
C.
Hybrid
C.
Hybrid
Answers
D.
BruteDics
D.
BruteDics
Answers
Suggested answer: C

What is the algorithm used by LM for Windows2000 SAM?

A.
MD4
A.
MD4
Answers
B.
DES
B.
DES
Answers
C.
SHA
C.
SHA
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: B

E-mail scams and mail fraud are regulated by which of the following?

A.
18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers
A.
18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers
Answers
B.
18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices
B.
18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices
Answers
C.
18 U.S.C. par. 1362 Communication Lines, Stations, or Systems
C.
18 U.S.C. par. 1362 Communication Lines, Stations, or Systems
Answers
D.
18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication
D.
18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication
Answers
Suggested answer: A

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

A.
BA810DBA98995F1817306D272A9441BB
A.
BA810DBA98995F1817306D272A9441BB
Answers
B.
44EFCE164AB921CQAAD3B435B51404EE
B.
44EFCE164AB921CQAAD3B435B51404EE
Answers
C.
0182BD0BD4444BF836077A718CCDF409
C.
0182BD0BD4444BF836077A718CCDF409
Answers
D.
CEC52EB9C8E3455DC2265B23734E0DAC
D.
CEC52EB9C8E3455DC2265B23734E0DAC
Answers
E.
B757BF5C0D87772FAAD3B435B51404EE
E.
B757BF5C0D87772FAAD3B435B51404EE
Answers
F.
E52CAC67419A9A224A3B108F3FA6CB6D
F.
E52CAC67419A9A224A3B108F3FA6CB6D
Answers
Suggested answer: B, E

Which of the following is the primary objective of a rootkit?

A.
It opens a port to provide an unauthorized service
A.
It opens a port to provide an unauthorized service
Answers
B.
It creates a buffer overflow
B.
It creates a buffer overflow
Answers
C.
It replaces legitimate programs
C.
It replaces legitimate programs
Answers
D.
It provides an undocumented opening in a program
D.
It provides an undocumented opening in a program
Answers
Suggested answer: C

This kind of password cracking method uses word lists in combination with numbers and special characters:

A.
Hybrid
A.
Hybrid
Answers
B.
Linear
B.
Linear
Answers
C.
Symmetric
C.
Symmetric
Answers
D.
Brute Force
D.
Brute Force
Answers
Suggested answer: A

_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

A.
Trojan
A.
Trojan
Answers
B.
RootKit
B.
RootKit
Answers
C.
DoS tool
C.
DoS tool
Answers
D.
Scanner
D.
Scanner
Answers
E.
Backdoor
E.
Backdoor
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58