Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-38 All Questions

View all questions & answers for the 312-38 exam

Exam 312-38 topic 1 question 366 discussion

Actual exam question from ECCouncil's 312-38
Question #: 366
Topic #: 1
[All 312-38 Questions]

Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?

  • A. Buffer overflow
  • B. Zero-day attack
  • C. Smurf attack
  • D. None
  • E. Shock brutal force
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Peduk70
Highly Voted 3 years, 5 months ago
The correct answer is brute force attack.
upvoted 5 times
...
5ed93df
Most Recent 3 months ago
misleading question, no such thing as shock brutal force, there is "brute force" approach
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...