Free ECSAv10 Exam Braindumps

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

  1. AES
  2. DES (ECB mode)
  3. MD5
  4. RC5

Answer(s): C



Which of the following protocols cannot be used to filter VoIP traffic?

  1. Media Gateway Control Protocol (MGCP)
  2. Real-time Transport Control Protocol (RTCP)
  3. Session Description Protocol (SDP)
  4. Real-Time Publish Subscribe (RTPS)

Answer(s): D



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C



Which of the following statements is true about the LM hash?

  1. Disabled in Windows Vista and 7 OSs
  2. Separated into two 8-character strings
  3. Letters are converted to the lowercase
  4. Padded with NULL to 16 characters

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

Calisto MF Moniz commented on October 12, 2024
No comment for this form for the time being.
Anonymous
upvote

Calisto MF Moniz commented on October 12, 2024
Good mechanism for Security expertise practices!
Anonymous
upvote

Raymond commented on July 06, 2021
This is my second purchase. I passed first exam already.
MEXICO
upvote