Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-49v10 All Questions
Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

ECCouncil CHFI v10 312-49v10 Question # 197 Topic 20 Discussion

312-49v10 Exam Topic 20 Question 197 Discussion:
Question #: 197
Topic #: 20

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?


A.

Syllable attack


B.

Hybrid attack


C.

Brute force attack


D.

Dictionary attack


Get Premium 312-49v10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.