exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 209 discussion

Actual exam question from CompTIA's CS0-002
Question #: 209
Topic #: 1
[All CS0-002 Questions]

When investigating a compromised system, a security analyst finds the following script in the /tmp directory:



Which of the following attacks is this script attempting, and how can it be mitigated?

  • A. This is a password-hijacking attack, and it can be mitigated by using strong encryption protocols.
  • B. This is a password-spraying attack, and it can be mitigated by using multifactor authentication
  • C. This is a password-dictionary attack, and it can be mitigated by forcing password changes every 30 day.
  • D. This is a credential-stuffing attack, and it can be mitigated by using multistep authentication.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Stiobhan
Highly Voted 2 years, 2 months ago
Selected Answer: B
This is 100% a password spray attack (brute force). Credential stuffing is a whole other technique when a username password pair are stolen (known) and used across other websites etc... to try and extended the breach, catching users who use the same login details across other websites/portals/resources etc.... https://owasp.org/www-community/attacks/Credential_stuffing#:~:text=An%20attacker%20takes%20the%20breached,sally%E2%80%9D%20is%20reusing%20their%20password.
upvoted 7 times
2Fish
2 years, 1 month ago
Agreed, this is text book password Spraying,
upvoted 1 times
...
...
SimonR2
Most Recent 1 year, 9 months ago
A password spraying campaign targets multiple accounts with one password at a time. Answer B
upvoted 1 times
...
Tricee
2 years ago
Selected Answer: D
This is definitely a credential stuffing attack. This attack involves a large number of username and password pairs to gain unauthorized access to user accounts on targeted online services. In this case they are were matching the password with an entire file of usernames.
upvoted 1 times
...
encxorblood
2 years, 2 months ago
Selected Answer: C
C. This is a password-dictionary attack, and it can be mitigated by enforcing strong password policies and implementing account lockout mechanisms. The script is attempting a password-dictionary attack, which involves trying a list of commonly used passwords against a large number of user accounts. The script uses a loop to iterate through a list of usernames contained in the "allusers.txt" file and attempts to log in to a system using the username and the password "passwordi23", which is a weak and easily guessable password.
upvoted 2 times
NerdAlert
2 years ago
It sounded like you defined dictionary attack, but then described a password spray attack. The script is trying to use the same password on a bunch of accounts
upvoted 1 times
...
AaronS1990
2 years, 2 months ago
But can it be protected against by changing passwords every 30 days? No that wouldn't protect at all
upvoted 1 times
...
...
ddcnsd65
2 years, 2 months ago
The answer is B. This is a "password spraying" attack and can be mitigated using MFA. D could've been the right answer but there is no technical term called "multistep" authentication. The CYSA + Certificaton study guide explicitly states for both occurances "For organizations , mandating "Mulifactor Authentication" is effective in slowing the effectiveness of attacks, especially those that are automated.
upvoted 2 times
...
prntscrn23
2 years, 4 months ago
Selected Answer: B
Definitely B as it uses same password across a .py file that has different user accounts.
upvoted 2 times
prntscrn23
2 years, 4 months ago
sorry not ".py file", it should be ".txt file"
upvoted 1 times
...
...
cmllsu
2 years, 4 months ago
Selected Answer: B
script uses the same password to login to different user account.
upvoted 2 times
...
mrodmv
2 years, 4 months ago
Selected Answer: B
https://owasp.org/www-community/attacks/Password_Spraying_Attack
upvoted 4 times
Comptia_Secret_Service
2 years, 4 months ago
from the article, "Password spraying is a type of brute force attack. In this attack, an attacker will brute force logins based on list of usernames with default passwords on the application. For example, an attacker will use one password (say, Secure@123) against many different accounts on the application to avoid account lockouts that would normally occur when brute forcing a single account with many passwords". Answer is indeed B.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago