SANS Hacker Tools, Techniques, Exploits and Incident Handling SEC504 Question # 55 Topic 6 Discussion
SEC504 Exam Topic 6 Question 55 Discussion:
Question #: 55
Topic #: 6
Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit