PdfPrep.com

In what two ways does the pass-the-hash attack allow an attacker to gain access to workstations, servers, and key services? (Choose two.)

In what two ways does the pass-the-hash attack allow an attacker to gain access to workstations, servers, and key services? (Choose two.)
A . Servers use the passed hash directly rather than computing a local version of the same password to make password hashing more efficient.
B . These attacks allow attackers to take advantage of other systems’ horizontal acknowledgment of user permissions without requiring re-authentication.
C . Many systems will accept a hash of the user password allowing the captured hash to be used for authentication.
D . All systems store passwords as hashes which can be interchanged among systems regardless of hashing algorithm.
E . All hash technologies have been reversed with publicly available rainbow tables for all hashes, giving attackers an easy ability to reverse any hash.

Answer: BC

Exit mobile version