Which of the follow...
 
Notifications
Clear all

Which of the following types of attacks was used to obtain the file and what should the analyst recommend to prevent this type of attack from reoccurring?

1 Posts
1 Users
0 Likes
154 Views
(@bulluckrolando)
Posts: 664
Noble Member
Topic starter
 

When reviewing a compromised authentication server, a security analyst discovers the following hidden file:

Further analysis shows these users never logged in to the server .

Which of the following types of attacks was used to obtain the file and what should the analyst recommend to prevent this type of attack from reoccurring?

  • A . A rogue LDAP server is installed on the system and is connecting passwords. The analyst should recommend wiping and reinstalling the server.
    B. A password spraying attack was used to compromise the passwords. The analyst should recommend that all users receive a unique password.
    C. A rainbow tables attack was used to compromise the accounts. The analyst should recommend that future password hashes contains a salt.
    D. A phishing attack was used to compromise the account. The analyst should recommend users install endpoint protection to disable phishing links.

Show Answer Hide Answer

Suggested Answer: B
 
Posted : 14/11/2022 6:57 pm
Topic Tags

Latest CS0-002 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: