exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 307 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 307
Topic #: 1
[All 312-49v10 Questions]

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

  • A. Dictionary attack
  • B. Brute force attack
  • C. Rule-based attack
  • D. Man in the middle attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ctaregistro
Highly Voted 2 years, 7 months ago
C. Rule-based attack. This attack is used when some information about the password is known
upvoted 10 times
...
VarunSuresh
Most Recent 11 months, 1 week ago
Its Rule-Based. Option C
upvoted 2 times
...
Elb
12 months ago
C: A rule-based password attack is a way of focusing a password cracking technique when an attacker knows which rules passwords in a particular system are based on, such as alphanumeric and characters long....
upvoted 1 times
...
bjornborg
1 year, 1 month ago
Selected Answer: C
def not dictionary
upvoted 2 times
...
ferari
2 years, 4 months ago
It is rule-based attack, it uses character set and information about a users known password trait.
upvoted 2 times
...
Chaoticda
2 years, 7 months ago
Rule based correct answer
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...