An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Answer(s): A
You have gained physical access to a Windows 2008 R2 server, which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?
Answer(s): C
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.Which file does the attacker need to modify?
Answer(s): D
____________is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.
Share your comments for EC-Council 312-50v12 exam with other users:
can i belive this dump
q31 answer should be d i think
good source
question 205 answer is b