Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 312-50 - Certified Ethical Hacker Exam

Page: 2 / 13
Total 614 questions

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

A.

BA810DBA98995F1817306D272A9441BB

B.

44EFCE164AB921CQAAD3B435B51404EE

C.

0182BD0BD4444BF836077A718CCDF409

D.

CEC52EB9C8E3455DC2265B23734E0DAC

E.

B757BF5C0D87772FAAD3B435B51404EE

F.

E52CAC67419A9A224A3B108F3FA6CB6D

Name two software tools used for OS guessing? (Choose two.)

A.

Nmap

B.

Snadboy

C.

Queso

D.

UserInfo

E.

NetBus

What is the difference between the AES and RSA algorithms?

A.

Both are asymmetric algorithms, but RSA uses 1024-bit keys.

B.

RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data.

C.

Both are symmetric algorithms, but AES uses 256-bit keys.

D.

AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to encrypt data.

Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?

A.

Maltego

B.

Cain & Abel

C.

Metasploit

D.

Wireshark

Which of the following is the primary objective of a rootkit?

A.

It opens a port to provide an unauthorized service

B.

It creates a buffer overflow

C.

It replaces legitimate programs

D.

It provides an undocumented opening in a program

Which of the following is designed to identify malicious attempts to penetrate systems?

A.

Intrusion Detection System

B.

Firewall

C.

Proxy

D.

Router

MX record priority increases as the number increases. (True/False.)

A.

True

B.

False

Which service in a PKI will vouch for the identity of an individual or company?

A.

KDC

B.

CA

C.

CR

D.

CBC

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?

A.

A Bo2k system query.

B.

nmap protocol scan

C.

A sniffer

D.

An SNMP walk

Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test.

While conducting a port scan she notices open ports in the range of 135 to 139.

What protocol is most likely to be listening on those ports?

A.

Finger

B.

FTP

C.

Samba

D.

SMB