GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 25 Topic 3 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 25 Topic 3 Discussion

CEH-001 Exam Topic 3 Question 25 Discussion:
Question #: 25
Topic #: 3

Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers.

Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?


A.

Hardware, Software, and Sniffing.


B.

Hardware and Software Keyloggers.


C.

Passwords are always best obtained using Hardware key loggers.


D.

Software only, they are the most effective.


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.