Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Transcript
D. Netbus
E. John the Ripper
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation: L0phtcrack and John the Ripper are two well know password-cracking programs. Netcat is
considered the Swiss-army knife of hacking tools,but is not used for password cracking
QUESTION 646
Password cracking programs reverse the hashing process to recover passwords.(True/False.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation: Password cracking programs do not reverse the hashing process. Hashing is a one- way process.
What these programs can do is to encrypt words,phrases,and characters using the same encryption process
and compare them to the original password. A hashed match reveals the true password.
QUESTION 647
While examining audit logs, you discover that people are able to telnet into the SMTP server on
port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing.
However, you are concerned about affecting the normal functionality of the email server. From the following
options choose how best you can achieve this objective?
A.
B.
C.
D.
E.
Block port 25 at the firewall.
Shut off the SMTP service on the server.
Force all connections to use a username and password.
Switch from Windows Exchange to UNIX Sendmail.
None of the above.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation: Blocking port 25 in the firewall or forcing all connections to use username and password would
have the consequences that the server is unable to communicate with other SMTP servers. Turning of the
SMTP service would disable the email function completely. All email servers use SMTP to communicate with
other email servers and therefore changing email server will not help.
QUESTION 648
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of
LM? (Choose three)
A.
B.
C.
D.
Converts passwords to uppercase.
Hashes are sent in clear text over the network.
Makes use of only 32 bit encryption.
Effective length is 7 characters.
Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup