WGU Network-and-Security-Foundation Network-and-Security-Foundation Question # 6 Topic 1 Discussion

WGU Network-and-Security-Foundation Network-and-Security-Foundation Question # 6 Topic 1 Discussion

Network-and-Security-Foundation Exam Topic 1 Question 6 Discussion:
Question #: 6
Topic #: 1

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?


A.

Phishing


B.

Dictionary attack


C.

Credential stuffing


D.

Social engineering


Get Premium Network-and-Security-Foundation Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.