Free 312-50v13 Exam Braindumps (page: 3)

Page 2 of 79

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve.

Which is this wireless security protocol?

  1. WPA3-Personal
  2. WPA3-Enterprise
  3. WPA2-Enterprise
  4. WPA2-Personal

Answer(s): B



What are common files on a web server that can be misconfigured and provide useful information for a hacker such as verbose error messages?

  1. httpd.conf
  2. administration.config
  3. php.ini
  4. idq.dll

Answer(s): C



Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exploited this information to launch other sophisticated attacks.

What is the tool employed by Gerard in the above scenario?

  1. Towelroot
  2. Knative
  3. zANTI
  4. Bluto

Answer(s): D



Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords.

Which of the following tools would not be useful for cracking the hashed passwords?

  1. Hashcat
  2. John the Ripper
  3. THC-Hydra
  4. netcat

Answer(s): B






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts