GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 81


Which of the following can be used in a USB attack to bypass authentication by hijacking the password libraries on a Windows system?

Show Answer
Correct Answer: BD

Kon-boot is a well-known software tool that is specifically designed to bypass authentication systems, including hijacking password libraries on Windows systems. This makes it the correct answer for a USB attack intended to bypass authentication. Other tools like Rubber Ducky, Lan Turtle, and Inception have different primary functions related to security testing and penetration but do not specifically target the authentication bypass by hijacking password libraries.

Discussion

1 comment
Sign in to comment
straleOption: D
Feb 26, 2024

D is correct