We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. Sam has used malware to access Sally's computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password. Which of the following types of attacks did he use?
5. Which of the following is the name of the attribute that stores passwords in a Group Policy preference item in Windows?
9. What are the two types of Intrusion Detection Systems (IDSs)?