Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 377 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 377
Topic #: 1
[All 312-49v10 Questions]

Jacky encrypts her documents using a password. It is known that she uses her daughter's year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

  • A. Rule-based attack
  • B. Brute force attack
  • C. Syllable attack
  • D. Hybrid attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
aqeel1506
4 months, 1 week ago
Given that Jacky uses her daughter's year of birth as part of the password, the most optimal password cracking technique would be: D. Hybrid attack A hybrid attack combines dictionary and brute force attacks. It starts with a dictionary of common words or known information (like a year of birth) and then adds variations (e.g., adding numbers, symbols, or different letter cases) to crack passwords that are based on predictable patterns or known personal information. This method would be efficient for cracking a password that includes a known element like a year of birth.
upvoted 2 times
...
Elb
6 months, 3 weeks ago
A. RBA use variations of words and known patterns to generate potential password combinations.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...