While reviewing the...
 
Notifications
Clear all

While reviewing the log files, the analyst discovers the following:

1 Posts
1 Users
0 Likes
169 Views
(@pesterfieldrayford)
Noble Member
Joined: 2 years ago
Posts: 681
Topic starter  

A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts.

While reviewing the log files, the analyst discovers the following:

Which of the following attacks MOST likely occurred?

  • A . Dictionary
  • B . Credential-stuffing
  • C . Password-spraying
  • D . Brute-force

Show Answer Hide Answer

Suggested Answer: D

Explanation:

"Brute force attack in which stolen user account names and passwords are tested against multiple websites." CompTIA SY0-601 Official Study Guide Page 690 This is a poorly worded question and while credential stuffing is a type of brute force attack, the information given does not indicate multiple websites. At best, this looks like a password spraying attack, but it is more likely a brute-force attack. Also note the output reads "unsername" and not "username" - perhaps irrelevant but the little things can and do matter

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: