What two describe how attackers obtain access to password hashes? (Choose two.)
A . brute-force attack
B . phishing attack
C . memory that is left behind from active log-on sessions
D . relevant authentication databases
Answer: CD
What two describe how attackers obtain access to password hashes? (Choose two.)
A . brute-force attack
B . phishing attack
C . memory that is left behind from active log-on sessions
D . relevant authentication databases
Answer: CD