Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?
Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?