Valid Network-and-Security-Foundation Dumps shared by ExamDiscuss.com for Helping Passing Network-and-Security-Foundation Exam! ExamDiscuss.com now offer the newest Network-and-Security-Foundation exam dumps, the ExamDiscuss.com Network-and-Security-Foundation exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Network-and-Security-Foundation dumps with Test Engine here:
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account. Which malicious attack strategy is represented in the scenario?
Correct Answer: B
Adictionary attackis a password-cracking method that systematically tries common words, phrases, and predictable passwords (e.g., "password123", "admin2024") to gain access to an account. Attackers often compile large lists of weak or reused passwords. * Phishingtricks users into revealing passwords but does not systematically test multiple words. * Credential stuffinguses breached passwords rather than guessing from a list. * Social engineeringmanipulates users but does not rely on automated password attempts.