Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 76 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 76 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 76 Discussion:
Question #: 76
Topic #: 8

During routine network monitoring, the blue team notices several LLMNR and NBT-NS broadcasts originating from a workstation attempting to resolve an internal hostname. They also observe suspicious responses coming from a non-corporate IP address that claims to be the requested host. Upon further inspection, the security team suspects that an attacker is impersonating network resources to capture authentication attempts. What type of password-cracking setup is likely being staged?


A.

Decrypt login tokens from wireless networks


B.

Use CPU resources to guess passphrases quickly


C.

Exploit name resolution to capture password hashes


D.

Match captured credentials with rainbow tables


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.