Valid Network-and-Security-Foundation Dumps shared by ExamDiscuss.com for Helping Passing Network-and-Security-Foundation Exam! ExamDiscuss.com now offer the newest Network-and-Security-Foundation exam dumps, the ExamDiscuss.com Network-and-Security-Foundation exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Network-and-Security-Foundation dumps with Test Engine here:
An attacker uses login data from a data breach to attempt to access another web service. Which malicious attack strategy is represented in the scenario?
Correct Answer: B
Credential stuffingis a cyberattack where attackers use stolen username-password combinations from one breach to try logging into other services, exploiting users who reuse passwords. Automated tools test multiple credentials against multiple sites, leading to unauthorized access. * Brute-force attacksystematically tries all possible passwords but does not use breached data. * Session hijackingintercepts active user sessions but does not use stolen credentials. * Social engineeringmanipulates users into revealing credentials, rather than using breached data.