Free ECSAv10 Exam Braindumps

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

  1. AES
  2. DES (ECB mode)
  3. MD5
  4. RC5

Answer(s): C



Which of the following protocols cannot be used to filter VoIP traffic?

  1. Media Gateway Control Protocol (MGCP)
  2. Real-time Transport Control Protocol (RTCP)
  3. Session Description Protocol (SDP)
  4. Real-Time Publish Subscribe (RTPS)

Answer(s): D



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C



Which of the following statements is true about the LM hash?

  1. Disabled in Windows Vista and 7 OSs
  2. Separated into two 8-character strings
  3. Letters are converted to the lowercase
  4. Padded with NULL to 16 characters

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam with other Community members:

ECSAv10 Discussions & Posts