Multiple Choice
Which of the following tools is used to perform a credential brute force attack?
A) Hydra
B) John the Ripper
C) Hashcat
D) Peach
Correct Answer:
Verified
Related Questions
Q140: A penetration tester reports an application is
Q141: In which of the following scenarios would
Q142: Which of the following tools would a
Q143: During a full-scope security assessment, which of
Q144: After several attempts, an attacker was able
Q146: When performing compliance-based assessments, which of the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents