New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 1 Question 1 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 1
Topic #: 1
[All ITS-110 Questions]

A site administrator is not enforcing strong passwords or password complexity. To which of the following types of attacks is this system probably MOST vulnerable?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Melynda
4 months ago
Wait, are people really still using weak passwords? That's wild!
upvoted 0 times
...
Cammy
4 months ago
Collision attacks? Nah, that’s not really the issue here.
upvoted 0 times
...
Nikita
4 months ago
Not so sure about that. Key loggers could also be a big risk.
upvoted 0 times
...
Denae
5 months ago
I agree, dictionary attacks are the way to go here.
upvoted 0 times
...
Tiera
5 months ago
Definitely a dictionary attack. Weak passwords are easy to guess.
upvoted 0 times
...
Lashawnda
5 months ago
Collision attacks seem less relevant here, but I could see how phishing could also exploit weak password policies. I'm a bit confused about the best choice.
upvoted 0 times
...
Franklyn
5 months ago
I practiced a question similar to this, and I think the answer might be a dictionary attack because it specifically targets weak passwords.
upvoted 0 times
...
Jenise
5 months ago
I'm not entirely sure, but I feel like key logger attacks might be a concern too, especially if users are typing in simple passwords.
upvoted 0 times
...
Talia
5 months ago
I remember studying about password attacks, and I think a dictionary attack is likely here since weak passwords can be easily guessed.
upvoted 0 times
...
Bulah
5 months ago
I've got this! The 30/70 split means 300 users on 2.4 GHz and 700 on 5 GHz. Each AP can handle around 50 clients, so we'll need 6 APs for the 2.4 GHz users and 14 for the 5 GHz users, for a total of 20 APs. The answer must be B, 28.
upvoted 0 times
...
Charlena
5 months ago
Okay, let me think this through. I need to make sure the SBC can detect if an endpoint is behind a NAT or firewall. I think the key is to set the nat-traversal parameter on the sip-interface, not the sip-port.
upvoted 0 times
...

Save Cancel