Which of the following BEST describes what occurred?

A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?
A. The hacker used a race condition.
B. The hacker used a pass-the-hash attack.
C. The hacker-exploited importer key management.
D. The hacker exploited weak switch configuration.

How To Pass SY0-601 Exam?

CompTIA SY0-601 PDF dumps.

High quality SY0-601 pdf and software. VALID exam to help you pass.

comptia-exams

One thought on “Which of the following BEST describes what occurred?

  1. [I believe it’s “B”, based on the Sybex Security+ Review Guide pg 38. See below.]
    But if anyone has any information as to why “D” would be correct please post.

    Pass the hash is an authentication attack that potentially can be used to gain access as an authorized user without actually knowing or possessing the plain text of the victim’s credentials. This attack is mostly aimed at Windows systems, which maintain a set of cached credentials (this is the item being referenced with the term “hash” in the attack name, which is also known as the authentication token) on client systems for the Windows domains they have authenticated into.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.