EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 6 : Windows Forensics |
||||
Questions available : 94 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: B
Question should be "what is not kept ..."
The HKLM∖SECURITY∖Policy∖Secrets registry key in Windows stores sensitive security-related data, including service account passwords, cached credentials, and encryption keys. This location is used by the Local Security Authority (LSA) to manage authentication secrets.
Service Account Passwords: Stored in an encrypted format for Windows services.
Cached Password Hashes: May contain credentials for previously logged-in users.
LSA Secrets: Includes auto-login credentials, VPN passwords, and other sensitive authentication data.
Kerberos Certificates: Stores local PKI-related authentication certificates