nerdexam
EC-CouncilEC-Council

312-49 · Question #237

312-49 Question #237: Real Exam Question with Answer & Explanation

The correct answer is C: Rule-based attack. A rule-based attack is the best choice when an attacker has prior knowledge about the target environment — such as password policies, naming conventions, or common formats used in the organization. Since George worked as an IT analyst at the company, he likely knows the Active

Submitted by zhang_li· Apr 18, 2026Network Forensics

Question

George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company's network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?

Options

  • ABrute force attack
  • BSyllable attack
  • CRule-based attack
  • DDictionary attack

Explanation

A rule-based attack is the best choice when an attacker has prior knowledge about the target environment — such as password policies, naming conventions, or common formats used in the organization. Since George worked as an IT analyst at the company, he likely knows the Active Directory password policy (e.g., minimum length, complexity requirements, common prefixes/suffixes). A rule-based attack applies these known rules to generate candidate passwords, making it far more efficient than brute force. A dictionary attack uses generic word lists, a syllable attack combines syllables, and brute force tries all combinations — none leverage insider knowledge as effectively as a rule-based approach.

Topics

#Password Cracking#Rule-based Attack#Service Accounts#Insider Threat

Community Discussion

No community discussion yet for this question.

Full 312-49 PracticeBrowse All 312-49 Questions