EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 14 : Malware Forensics
         
Questions available : 29 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 802  
   
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer‘s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies‘ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files


 
A:    Syllable attack
 
B:    Hybrid attack
C:    Brute force attack
 
D:    Dictionary attack
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 19/05/2025
Opted Answer: D
Trojan horse steals sensitive data: Passwords, banking details, and personal files.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations