Question: 25
Which of the following is a primary benefit of implementing ...
A cybersecurity team is analyzing two separate attack attempts on their online platform. In the first attack, the attacker uses a list of previously leaked usernames and passwords from a different service to try accessing accounts on the platform. In the second attack, the attacker systematically tries a set of the most commonly used passwords across a wide range of user accounts on the platform without any prior knowledge of the users' actual passwords.
Based on these scenarios, which statement correctly distinguishes the second attack from the first?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!