exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 304 discussion

Actual exam question from CompTIA's N10-008
Question #: 304
Topic #: 1
[All N10-008 Questions]

A user calls the IT department to report being unable to log in after locking the computer. The user resets the password, but later in the day the user is again unable to log in after locking the computer. Which of the following attacks against the user is MOST likely taking place?

  • A. Brute-force
  • B. On-path
  • C. Deauthentication
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 4 months ago
Selected Answer: A
So many wrong answers on this dump. Its brute force. Someone is trying out passwords and locking your account. You have a 3 wrong password and lockout policy in Active Directory.
upvoted 15 times
...
pedrwc7
Highly Voted 2 years, 1 month ago
Selected Answer: A
Active Directory - IT Department resets the password Brute-Force Attack - Every time user comes back to their computer, users acount is being locked. With that being said, I would assume someone is trying to guess their password to access the user computer while the user is away. A. Brute-force - Tries every possible combination until they figure out the password B. On-path - Occurs when an attacker puts themselves between the victim and the intended destination C. Deauthentication - Attempts to interrupt communication between an end user and the wireless access point D. Phishing - Sending an email in an attempt to get a user to click a link. Sending out emails to capture the most people and doesn’t really target
upvoted 10 times
...
Commando9800
Most Recent 4 weeks ago
Selected Answer: A
Omg im gonna lose my sanity with these Qs. If it was brute force then it should him a message of repeated logins no? the only possible I think is C. Deauthentication because he has to authenticate again and he isn't ? but then is he authenticating locally? if so then brute force, if authentication requires Internet then its C. . Sorry im frustrated. probably A because he reset the password and then it happened again. and this r3tard IT department did not check logs to tell him to do something about it.
upvoted 1 times
...
Heyling
9 months, 1 week ago
The correct answer is C. Deauthentication. Here's why: The user is able to log in initially, but after locking the computer, they are unable to log in again. This suggests that the issue is not with the password itself, but rather with the authentication process.
upvoted 2 times
...
toffer96
1 year ago
Selected Answer: A
I think the key here is 'unable to log in after locking the computer'. Deauthentication can happen as you're actively using a wireless device.
upvoted 1 times
...
ozil786
1 year ago
Selected Answer: C
ChatGBT says C is correct but not sure
upvoted 1 times
...
AK4U_111
1 year, 6 months ago
the answer here is actually a dictionary attack, but since it is not listed, i would say bruteforce
upvoted 1 times
vinbra
1 year, 3 months ago
I could have your username and start trying random passwords. You dont need a dictionary to block someone else account
upvoted 1 times
...
...
Cherubael
1 year, 7 months ago
The only thing that throws me off is the fact that brute force takes FOREVER and the fact that this attacker is able to get the password that SAME DAY doesn't really add up to me 😂 Honestly On-Path would make more sense given how if it was lets say LDAP which is unencrypted plaintext by default (Unless you do SLDAP).
upvoted 1 times
...
Juliana1017
1 year, 8 months ago
Selected Answer: A
correct answer is A
upvoted 1 times
...
gho5tface
1 year, 8 months ago
Boo Boo, the ghost says A!
upvoted 1 times
...
Ali3ngazer
1 year, 9 months ago
Selected Answer: A
It's A, guys the computer is LOCKED OUT after someone tried to gain access to the user's computer after he LOCKED the computer. That is Brute-Force. It is not C because Deauthenication is for ONLY WIRELESS devices and in this question, they do not specify if the user's computer is connected wirelessly or thru Ethernet.
upvoted 2 times
...
Doaa81
1 year, 11 months ago
Selected Answer: A
In this question, they didn't explain whether this computer is on an Ethernet connection or a wireless connection. Deauthentication interrupts communication between an end user and the wireless access point. Only brute-force attacks can cause this issue.
upvoted 2 times
...
famco
2 years ago
Trick on DeaAuth. It is definitely BruteForce that causes the account to lock out. What a bad question. The only purpose is the play on Deauthentication
upvoted 2 times
...
StellarSteve
2 years, 1 month ago
Selected Answer: A
SKIDADDLE SKADOODLE If you dont pick A you are a NOODLE.
upvoted 2 times
...
BenBen1234
2 years, 1 month ago
Selected Answer: C
I'm also going to go with C. A brute-force attack will most likely happen after deauthentication was performed. I read several articles and this one was the best. It tells you how to deauthenticate someone and explain. Scroll all the way in the bottom and read after Phishing attacks. Hopefully this helps https://hackernoon.com/forcing-a-device-to-disconnect-from-wifi-using-a-deauthentication-attack-f664b9940142
upvoted 2 times
BenBen1234
2 years, 1 month ago
If the person was getting kicked off the network and not being able to log in I would say Deauthentication. My apologies.
upvoted 2 times
...
BenBen1234
2 years, 1 month ago
Disregard. This answer! I was reading too fast. The user never got kicked off the network. Hence why i went C.
upvoted 1 times
...
...
233Matis
2 years, 2 months ago
Selected Answer: C
Deauthentication attacks target the communication between a user's device and the network it is connected to. When a user locks their computer, the computer may disconnect from the network. If a deauthentication attack is taking place, an attacker may be sending deauthentication packets to the user's device, causing it to disconnect from the network and making it difficult for the user to log back in.
upvoted 3 times
...
MelzTheArtist
2 years, 2 months ago
Based on the information given, the most likely attack taking place is a Deauthentication attack. In a Deauthentication attack, an attacker sends deauthentication packets to a target device in order to disconnect it from its current network. This can result in the target device losing its connection and being unable to log in again until the connection is reestablished. In this scenario, it is possible that the attacker is using a Deauthentication attack to disrupt the user's connection after the user locks the computer, resulting in the inability to log in after resetting the password.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago