ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

A.
All are hacking tools developed by the legion of doom
A.
All are hacking tools developed by the legion of doom
Answers
B.
All are tools that can be used not only by hackers, but also security personnel
B.
All are tools that can be used not only by hackers, but also security personnel
Answers
C.
All are DDOS tools
C.
All are DDOS tools
Answers
D.
All are tools that are only effective against Windows
D.
All are tools that are only effective against Windows
Answers
E.
All are tools that are only effective against Linux
E.
All are tools that are only effective against Linux
Answers
Suggested answer: C

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

A.
There is no way to tell because a hash cannot be reversed
A.
There is no way to tell because a hash cannot be reversed
Answers
B.
The right most portion of the hash is always the same
B.
The right most portion of the hash is always the same
Answers
C.
The hash always starts with AB923D
C.
The hash always starts with AB923D
Answers
D.
The left most portion of the hash is always the same
D.
The left most portion of the hash is always the same
Answers
E.
A portion of the hash will be all 0's
E.
A portion of the hash will be all 0's
Answers
Suggested answer: B

When discussing passwords, what is considered a brute force attack?

A.
You attempt every single possibility until you exhaust all possible combinations or discover the password
A.
You attempt every single possibility until you exhaust all possible combinations or discover the password
Answers
B.
You threaten to use the rubber hose on someone unless they reveal their password
B.
You threaten to use the rubber hose on someone unless they reveal their password
Answers
C.
You load a dictionary of words into your cracking program
C.
You load a dictionary of words into your cracking program
Answers
D.
You create hashes of a large number of words and compare it with the encrypted passwords
D.
You create hashes of a large number of words and compare it with the encrypted passwords
Answers
E.
You wait until the password expires
E.
You wait until the password expires
Answers
Suggested answer: A

Which of the following are well known password-cracking programs?

A.
L0phtcrack
A.
L0phtcrack
Answers
B.
NetCat
B.
NetCat
Answers
C.
Jack the Ripper
C.
Jack the Ripper
Answers
D.
Netbus
D.
Netbus
Answers
E.
John the Ripper
E.
John the Ripper
Answers
Suggested answer: A, E

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server.

From the following options choose how best you can achieve this objective?

A.
Block port 25 at the firewall.
A.
Block port 25 at the firewall.
Answers
B.
Shut off the SMTP service on the server.
B.
Shut off the SMTP service on the server.
Answers
C.
Force all connections to use a username and password.
C.
Force all connections to use a username and password.
Answers
D.
Switch from Windows Exchange to UNIX Sendmail.
D.
Switch from Windows Exchange to UNIX Sendmail.
Answers
E.
None of the above.
E.
None of the above.
Answers
Suggested answer: E

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

A.
Converts passwords to uppercase.
A.
Converts passwords to uppercase.
Answers
B.
Hashes are sent in clear text over the network.
B.
Hashes are sent in clear text over the network.
Answers
C.
Makes use of only 32-bit encryption.
C.
Makes use of only 32-bit encryption.
Answers
D.
Effective length is 7 characters.
D.
Effective length is 7 characters.
Answers
Suggested answer: A, B, D

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters.

With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

A.
Online Attack
A.
Online Attack
Answers
B.
Dictionary Attack
B.
Dictionary Attack
Answers
C.
Brute Force Attack
C.
Brute Force Attack
Answers
D.
Hybrid Attack
D.
Hybrid Attack
Answers
Suggested answer: D

An attacker runs netcat tool to transfer a secret file between two hosts.

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

A.
Machine A: netcat -l -p -s password 1234 < testfileMachine B: netcat 1234
A.
Machine A: netcat -l -p -s password 1234 < testfileMachine B: netcat 1234
Answers
B.
Machine A: netcat -l -e magickey -p 1234 < testfileMachine B: netcat 1234
B.
Machine A: netcat -l -e magickey -p 1234 < testfileMachine B: netcat 1234
Answers
C.
Machine A: netcat -l -p 1234 < testfile -pw passwordMachine B: netcat 1234 -pw password
C.
Machine A: netcat -l -p 1234 < testfile -pw passwordMachine B: netcat 1234 -pw password
Answers
D.
Use cryptcat instead of netcat
D.
Use cryptcat instead of netcat
Answers
Suggested answer: D

What is GINA?

A.
Gateway Interface Network Application
A.
Gateway Interface Network Application
Answers
B.
GUI Installed Network Application CLASS
B.
GUI Installed Network Application CLASS
Answers
C.
Global Internet National Authority (G-USA)
C.
Global Internet National Authority (G-USA)
Answers
D.
Graphical Identification and Authentication DLL
D.
Graphical Identification and Authentication DLL
Answers
Suggested answer: D
Total 573 questions
Go to page: of 58