Free EC-Council ECSAv10 Exam Braindumps (page: 31)

Which of the following password hashing algorithms is used in the NTLMv2 authentication mechanism?

  1. AES
  2. DES (ECB mode)
  3. MD5
  4. RC5

Answer(s): C



Which of the following protocols cannot be used to filter VoIP traffic?

  1. Media Gateway Control Protocol (MGCP)
  2. Real-time Transport Control Protocol (RTCP)
  3. Session Description Protocol (SDP)
  4. Real-Time Publish Subscribe (RTPS)

Answer(s): D



What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

  1. Connect Scanning Techniques
  2. SYN Scanning Techniques
  3. Stealth Scanning Techniques
  4. Port Scanning Techniques

Answer(s): C



Which of the following statements is true about the LM hash?

  1. Disabled in Windows Vista and 7 OSs
  2. Separated into two 8-character strings
  3. Letters are converted to the lowercase
  4. Padded with NULL to 16 characters

Answer(s): A



Viewing page 31 of 52
Viewing questions 121 - 124 out of 203 questions



Post your Comments and Discuss EC-Council ECSAv10 exam prep with other Community members:

ECSAv10 Exam Discussions & Posts