Which of the following can be used in a pass-the-hash attack?

A file contains several hashes. Which of the following can be used in a pass-the-hash attack?
A. NTLMv2
B. Kerberos
C. NTLMv1
D. LMv2
E. NTLM

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.