Which of the following would allow an administrator to find weak passwords on the network?
A.
A network mapper
B.
A hash function
C.
A password generator
D.
A rainbow table
Which of the following would allow an administrator to find weak passwords on the network?
Which of the following would allow an administrator to find weak passwords on the network?
A.
A network mapper
B.
A hash function
C.
A password generator
D.
A rainbow table