Certified Ethical Hacker (CEHv9) Questions and answers
91. Which method of password cracking takes the most time and effort
A. Rainbow tables
B. Shoulder suable
C. Brute force
D. Dictionary attack
92. Under the "Post-attack Phase and Activities," it is the responsibility of the tester to restore the systems to a pre-test state.
Which of the following activities should not be included in this phase?
I. Removing all files uploaded on the system II. Cleaning all registry entries III. Mapping of network state N. Removing all tools and maintaining backdoor for reporting