Based on the bellow I believe A is the answer.
https://www.osgusa.com/l0phtcrack/
"L0phtcrack works by first obtaining password hashes. L0phtCrack has the ability to obtain password hashes directly from other machines on the network remotely, making it easy for network administrators. Audits performed by L0phtCrack can be done manually or can be scheduled to run at predetermined times. Once L0phtcrack is in possession of groups of password hashes, it subjects them to several attacks. After checking that the password is not the same as the username, the program performs a dictionary attack, a hybrid attack, a pre-computed attack using rainbow tables, and a brute-force attack."
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.312-50 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
XX20Jim20XX
8 months ago