During an engagement, a penetration tester found the following list of strings inside a file:
Which of the following is the BEST technique to determine the known plaintext of the strings?
A . Dictionary attack
B. Rainbow table attack
C. Brute-force attack
D. Credential-stuffing attack
Answer: B
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund