ECCouncil Exam Questions

After gaining access to the password hashes used to protect access to a web based application, knowl

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be

useful to gain access to the application?

A. SHA1

B. Diffie-Helman

C. RSA

D. AES