ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 501 - 312-49v10 discussion

Report
Export

Gill is a computer forensics investigator who has been called upon to examine a seized computer.

This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

A.
Syllable attack
Answers
A.
Syllable attack
B.
Hybrid attack
Answers
B.
Hybrid attack
C.
Brute force attack
Answers
C.
Brute force attack
D.
Dictionary attack
Answers
D.
Dictionary attack
Suggested answer: D
asked 18/09/2024
Knowledge Mathebula
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first