Free 312-49V9 Exam Braindumps (page: 41)

Page 41 of 122

Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

  1. Brute forcing attack
  2. Hybrid attack
  3. Syllable attack
  4. Rule-based attack

Answer(s): B



What is static executable file analysis?

  1. It is a process that consists of collecting information about and from an executable file without actually launching the file under any circumstances
  2. It is a process that consists of collecting information about and from an executable file by launching the file under any circumstances
  3. It is a process that consists of collecting information about and from an executable file without actually launching an executable file in a controlled and monitored environment
  4. It is a process that consists of collecting information about and from an executable file by launching an executable file in a controlled and monitored environment

Answer(s): A



Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

  1. IP address spoofing
  2. Man-in-the-middle attack
  3. Denial of Service attack
  4. Session sniffing

Answer(s): A



Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?

  1. Errors-To header
  2. Content-Transfer-Encoding header
  3. Mime-Version header
  4. Content-Type header

Answer(s): A



Page 41 of 122



Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

Olu commented on October 16, 2023
Question 235: 22,164 x 80 x 63 x 512 = 57.19 GB
UNITED STATES
upvote