PdfPrep.com

What two describe how attackers obtain access to password hashes? (Choose two.)

What two describe how attackers obtain access to password hashes? (Choose two.)
A . brute-force attack
B . phishing attack
C . memory that is left behind from active log-on sessions
D . relevant authentication databases

Answer: CD

Exit mobile version