Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?
Answer(s): C
Which of the following protocols cannot be used to filter VoIP traffic?
Answer(s): D
What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?
Which of the following statements is true about the LM hash?
Answer(s): A
Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:
Calisto MF Moniz commented on October 12, 2024 No comment for this form for the time being. Anonymous upvote
Calisto MF Moniz commented on October 12, 2024 Good mechanism for Security expertise practices! Anonymous upvote
Raymond commented on July 06, 2021 This is my second purchase. I passed first exam already. MEXICO upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ECSAv10 content, but please register or login to continue.