ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

When discussing passwords, what is considered a brute force attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

Which of the following are well known password-cracking programs?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server.

From the following options choose how best you can achieve this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters.

With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

An attacker runs netcat tool to transfer a secret file between two hosts.

ECCouncil 312-50v12 image Question 159 24889 09182024185521000000

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

What is GINA?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58

Related questions