EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 5 : Defeating Anti-forensics Techniques
         
Questions available : 49 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 303  
   
Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe is also using a graphical generator that supports SHA1.
a. What password technique is being used?
b. What tool is Chloe using?


 
A:    a. Dictionary attack b. Cisco PIX
 
B:    a. Cain & Able b. Rten
C:    a. Rainbow Tables b. Winrtgen
 
D:    a. Brute-force b. MScache
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer




















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations