Which of the following can be used in a pass-the-hash attack?

A file contains several hashes.

Which of the following can be used in a pass-the-hash attack?
A . NTLMv2
B . Kerberos
C . NTLMv1
D . LMv2
E . NTLM

Answer: B

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments