Posted by: Pdfprep
Post Date: November 11, 2020
What two describe how attackers obtain access to password hashes? (Choose two.)
A . brute-force attack
B . phishing attack
C . memory that is left behind from active log-on sessions
D . relevant authentication databases
Answer: CD