Which of the following can be used in a pass-the-hash attack?
A file contains several hashes.
Which of the following can be used in a pass-the-hash attack?
A . NTLMv2
B . Kerberos
C . NTLMv1
D . LMv2
E . NTLM
Answer: B
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments