EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
L0phtCrack in sniffing mode to try and obtain Hillary’s network password hash, which suggests that the tool is being used for password cracking or auditing purposes.
L0phtCrack employs techniques such as dictionary attacks, brute-force attacks, and rainbow tables to assess password security.