{"id":228,"date":"2020-03-29T09:10:04","date_gmt":"2020-03-29T08:10:04","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question215\/"},"modified":"2020-03-29T11:16:23","modified_gmt":"2020-03-29T10:16:23","slug":"certified-ethical-hacker-312-50v10-question215","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question215\/","title":{"rendered":"Certified Ethical Hacker 312-50v10 &#8211; Question215"},"content":{"rendered":"<div class=\"question\">Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands:<br \/>\n<img loading=\"lazy\" src=\"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-content\/uploads\/2020\/03\/Page-60-Image-11.jpg\" alt=\"\" width=\"520\" height=\"157\" class=\"alignnone size-full wp-image-345\" srcset=\"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-content\/uploads\/2020\/03\/Page-60-Image-11.jpg 520w, https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-content\/uploads\/2020\/03\/Page-60-Image-11-300x91.jpg 300w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><br \/>\nWhat is she trying to achieve?<br \/>\n<br \/><strong><br \/>A.<\/strong> She is using ftp to transfer the file to another hacker named John. <br \/><strong>B.<\/strong> She is using John the Ripper to crack the passwords in the secret.txt file <br \/><strong>C.<\/strong> She is encrypting the file. <br \/><strong>D.<\/strong> She is using John the Ripper to view the contents of the file.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands: What is she trying to achieve? A. She is using ftp to transfer the file to another hacker named John. B. She is using John the Ripper to crack the passwords in the secret.txt file C. She is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[3,218],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/228"}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/228\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/228\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/media?parent=228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/categories?post=228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/tags?post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}