WGU Network-and-Security-Foundation Network-and-Security-Foundation Question # 7 Topic 1 Discussion

WGU Network-and-Security-Foundation Network-and-Security-Foundation Question # 7 Topic 1 Discussion

Network-and-Security-Foundation Exam Topic 1 Question 7 Discussion:
Question #: 7
Topic #: 1

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?


A.

Brute-force attack


B.

Credential stuffing


C.

Session hijacking


D.

Social engineering


Get Premium Network-and-Security-Foundation Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.