Quizzes.technology

πŸ›‘οΈ Free practice test question from: Password attack (Security+)

Password attackSecurity+

A cybersecurity team is analyzing two separate attack attempts on their online platform. In the first attack, the attacker uses a list of previously leaked usernames and passwords from a different service to try accessing accounts on the platform. In the second attack, the attacker systematically tries a set of the most commonly used passwords across a wide range of user accounts on the platform without any prior knowledge of the users' actual passwords.

Based on these scenarios, which statement correctly distinguishes the second attack from the first?

πŸ’¬ Discussion and Feedback

Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! πŸ™

Comments

No comments yet. Be the first to comment!