What are the means that Bob can use to get password from his client hosts and servers?

Bob is conducting a password assessment for one of his clients. Bob suspects that password policies are not in place and weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. What are the means that Bob can use to get password from his client hosts and servers?

Bob is conducting a password assessment for one of his clients. Bob suspects that password policies are not in place and weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. What are the means that Bob can use to get password from his client hosts and servers?

A.
Passwords are always best obtained using Hardware key loggers

B.
Hardware and Software Keyloggers

C.
Software only, they are the most effective

D.
Hardware, Software, and Sniffing

Explanation:
All loggers will work as long as he has physical access to the computers.



Leave a Reply 0

Your email address will not be published. Required fields are marked *