nerdexam
EC-CouncilEC-Council

312-49 · Question #669

312-49 Question #669: Real Exam Question with Answer & Explanation

Sign in or unlock 312-49 to reveal the answer and full explanation for question #669. The question stem and answer options stay visible for context.

Submitted by lukas.cz· Apr 18, 2026Disk Forensics

Question

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

Options

  • ASyllable attack
  • BHybrid attack
  • CBrute force attack
  • DDictionary attack

Unlock 312-49 to see the answer

You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Password Cracking#SAM Files#Domain Controller Compromise#Digital Forensics
Full 312-49 PracticeBrowse All 312-49 Questions