EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 6 : Windows Forensics |
||||
Questions available : 94 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 81
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: B
Question should be "what is not kept ..."
The HKLM∖SECURITY∖Policy∖Secrets registry key in Windows stores sensitive security-related data, including service account passwords, cached credentials, and encryption keys. This location is used by the Local Security Authority (LSA) to manage authentication secrets.
Service Account Passwords: Stored in an encrypted format for Windows services.
Cached Password Hashes: May contain credentials for previously logged-in users.
LSA Secrets: Includes auto-login credentials, VPN passwords, and other sensitive authentication data.
Kerberos Certificates: Stores local PKI-related authentication certificates