Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 500 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 500
Topic #: 1
[All 312-49v10 Questions]

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

  • A. Syllable attack
  • B. Hybrid attack
  • C. Brute force attack
  • D. Dictionary attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
4bd3116
4 months ago
Selected Answer: D
the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords.
upvoted 1 times
...
aqeel1506
4 months ago
The other techniques mentioned: Syllable Attack: This is a less common term and typically refers to attacking passwords based on phonetic syllables, which isn't the primary method for cracking passwords stored in SAM files. Hybrid Attack: This is a combination of dictionary and brute force methods, where a dictionary attack is combined with common variations, such as adding numbers or symbols. While effective, it's more complex than a simple dictionary attack. Brute Force Attack: This method tries all possible combinations of characters until the correct one is found. It is very time-consuming and computationally intensive, especially for complex passwords, and is less likely to be the first choice compared to a dictionary attack. In the context of password cracking from SAM files, where common passwords and patterns are often used, a dictionary attack is a practical and commonly used technique.
upvoted 1 times
...
aqeel1506
4 months ago
D. Dictionary attack Explanation: Dictionary Attack: This method involves using a list of commonly used passwords (the "dictionary") to guess passwords. Since SAM files typically store password hashes, attackers use dictionary attacks to attempt to match these hashes with precomputed hashes of commonly used passwords.
upvoted 1 times
...
Elb
6 months ago
Because a dictionary attack can be done quickly, many organizations require users to create passwords that have a special character, number, capital letter, and be eight characters or greater...
upvoted 1 times
...
Elb
6 months, 3 weeks ago
Selected Answer: D
https://www.sciencedirect.com/topics/computer-science/dictionary-attack Figure 6.3
upvoted 1 times
...
topbarry
1 year ago
Selected Answer: C
The most likely password cracking technique used by this hacker to break the user passwords from the SAM files is C. Brute force attack.
upvoted 1 times
...
gooftroop
1 year, 10 months ago
C. Brute force attack
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...