Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 106 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 106
Topic #: 1
[All 312-50v12 Questions]

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks.
What is the type of attack performed by Simon?

  • A. Combinator attack
  • B. Dictionary attack
  • C. Rainbow table attack
  • D. Internal monologue attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
sunce12
5 months ago
correct is D
upvoted 1 times
...
insaniunt
11 months ago
Selected Answer: D
D. Internal monologue attack This is a technique that allows an attacker to retrieve NTLM hashes from a system without touching the LSASS process, which is usually protected by security solutions
upvoted 1 times
...
Vincent_Lu
1 year, 4 months ago
Selected Answer: D
D. Internal monologue attack
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: D
D. Internal monologue attack
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: D
D. Internal monologue attack Like Sausageman but on my books CEH V12 Module 06 P615
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: D
D. Internal monologue attack CEH v12 book Module 06 Page 414 "The attacker disables the security controls of NetNTLMv1 by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic."
upvoted 4 times
...
eli117
1 year, 7 months ago
Selected Answer: D
D. Internal monologue attack Explanation: In this scenario, Simon performed an internal monologue attack, also known as a pass-the-hash attack. He disabled the security controls of NetNTLMv1 and extracted all the non-network logon tokens from active processes, which he then used to masquerade as a legitimate user to launch further attacks. This attack is particularly dangerous because it allows the attacker to bypass password authentication and gain access to sensitive information or systems.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...