What two describe how attackers obtain access to password hashes? (Choose two.)

Posted by: Pdfprep Category: 210-250 Tags: , ,

What two describe how attackers obtain access to password hashes? (Choose two.)
A . brute-force attack
B . phishing attack
C . memory that is left behind from active log-on sessions
D . relevant authentication databases

Answer: CD