New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus ITS-110 Exam - Topic 2 Question 64 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 64
Topic #: 2
[All ITS-110 Questions]

A hacker wants to discover login names that may exist on a website. Which of the following responses to the login and password entries would aid in the discovery? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, C

Contribute your Thoughts:

0/2000 characters
Cordelia
11 days ago
Totally agree, C is a big red flag!
upvoted 0 times
...
Lyndia
16 days ago
A and C are the ones that give away info.
upvoted 0 times
...
Aretha
21 days ago
Haha, this is like a hacking tutorial disguised as a security exam. Tricky stuff!
upvoted 0 times
...
Jestine
26 days ago
Hmm, I think A and E are the best options. Wouldn't want to give away too much info to the hacker.
upvoted 0 times
...
Sheridan
1 month ago
I'm pretty sure B and D are the right answers. Gotta be careful with these questions.
upvoted 0 times
...
Marla
1 month ago
Wow, really? Helping hackers discover valid usernames? That's not cool.
upvoted 0 times
...
Mabel
1 month ago
A and D are the correct answers. They provide the hacker with information about valid usernames.
upvoted 0 times
...
Delpha
2 months ago
C seems like a clear indicator, but I wonder if A could also be useful in some scenarios.
upvoted 0 times
...
Nicolette
2 months ago
I'm leaning towards B and E, but I can't recall if those would really help a hacker.
upvoted 0 times
...
Cammy
2 months ago
I remember practicing similar questions, and I feel like D could also give away too much information.
upvoted 0 times
...
Regenia
2 months ago
Okay, I think I've got a strategy here. The responses that directly confirm a valid username, like "That user does not exist," are probably the most useful for the hacker. I'll go with those and see if I can narrow down some potential login names.
upvoted 0 times
...
Candida
2 months ago
Hmm, this is a tricky one. I want to be careful not to do anything that could be considered hacking or unethical. I think I'll go with the more generic responses like "Invalid password" or "Incorrect email/password combination" to be on the safe side.
upvoted 0 times
...
Lashawnda
3 months ago
I think options A and C might be the most revealing, but I'm not entirely sure.
upvoted 0 times
...
Jeffrey
3 months ago
I think C and D are the best options.
upvoted 0 times
...
Stefany
3 months ago
D is also useful. It confirms something is wrong.
upvoted 0 times
...
Margurite
3 months ago
I'm a little confused on this one. I'm not sure if I should focus on the login attempt being unsuccessful or the password being invalid. Maybe I should just try a few different options and see what works best.
upvoted 0 times
...
Cornell
4 months ago
I think the key here is to look for responses that provide the most information about valid usernames. Responses like "That user does not exist" or "The username and/or password are incorrect" seem like they could be helpful.
upvoted 0 times
Marguerita
2 months ago
I agree, those responses give away too much info.
upvoted 0 times
...
Barrie
3 months ago
Both responses could lead to a successful hack.
upvoted 0 times
...
...

Save Cancel