A pass-the-hash attack is commonly used to:

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A pass-the-hash attack is commonly used to:
A . modify DNS records to point to a different domain.
B . modify the IP address of the targeted computer.
C . execute java script to capture user credentials.
D . laterally move across the network.

Answer: D

Leave a Reply

Your email address will not be published.