312-49 · Question #237
312-49 Question #237: Real Exam Question with Answer & Explanation
The correct answer is C: Rule-based attack. A rule-based attack is the best choice when an attacker has prior knowledge about the target environment — such as password policies, naming conventions, or common formats used in the organization. Since George worked as an IT analyst at the company, he likely knows the Active
Question
George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company's network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?
Options
- ABrute force attack
- BSyllable attack
- CRule-based attack
- DDictionary attack
Explanation
A rule-based attack is the best choice when an attacker has prior knowledge about the target environment — such as password policies, naming conventions, or common formats used in the organization. Since George worked as an IT analyst at the company, he likely knows the Active Directory password policy (e.g., minimum length, complexity requirements, common prefixes/suffixes). A rule-based attack applies these known rules to generate candidate passwords, making it far more efficient than brute force. A dictionary attack uses generic word lists, a syllable attack combines syllables, and brute force tries all combinations — none leverage insider knowledge as effectively as a rule-based approach.
Topics
Community Discussion
No community discussion yet for this question.