New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA DS0-001 Exam - Topic 5 Question 21 Discussion

Actual exam question for CompTIA's DS0-001 exam
Question #: 21
Topic #: 5
[All DS0-001 Questions]

An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Caprice
3 months ago
I thought SQL injection was more common for this kind of thing?
upvoted 0 times
...
Kiley
3 months ago
No way, it's clearly brute-force.
upvoted 0 times
...
Dorinda
3 months ago
Wait, could it be phishing? Seems a bit off.
upvoted 0 times
...
Luz
4 months ago
Agreed, using common passwords fits the description.
upvoted 0 times
...
Kristeen
4 months ago
Definitely a brute-force attack.
upvoted 0 times
...
Albert
4 months ago
I keep mixing up SQL injection and phishing, but I don't think either applies here. It's definitely about password guessing, so brute-force seems right.
upvoted 0 times
...
Mammie
4 months ago
This question feels familiar; I practiced one like it where we had to identify different types of attacks. I think brute-force fits best here.
upvoted 0 times
...
Wilburn
4 months ago
I'm not entirely sure, but I remember something about DoS attacks being more about overwhelming a system, not just guessing passwords.
upvoted 0 times
...
Fernanda
5 months ago
I think this is a brute-force attack since it's trying common passwords to get in.
upvoted 0 times
...
Gracia
5 months ago
Easy peasy, this is definitely a brute-force attack. The script is just trying random passwords to gain access, so B is the right answer here.
upvoted 0 times
...
Felix
5 months ago
I'm a little confused on this one. Is it possible that it could be a SQL injection attack if the script is trying to exploit vulnerabilities in the login system? I'll have to review my notes on different types of attacks.
upvoted 0 times
...
Louvenia
5 months ago
Okay, I've got this. The script is using common passwords to try and break into the system, so the correct answer has to be B. Brute-force attack.
upvoted 0 times
...
Jacqueline
5 months ago
Hmm, I'm not totally sure about this one. Could it also be a DoS attack if the script is trying to overwhelm the system with login attempts? I'll have to think this through a bit more.
upvoted 0 times
...
Florencia
5 months ago
This one seems pretty straightforward. The script is using common passwords to gain access, so it's got to be a brute-force attack.
upvoted 0 times
...
Anna
5 months ago
I'm a bit unsure about this one. The options seem to cover different network-related commands, but I'm not sure which one is the best fit for measuring throughput and latency.
upvoted 0 times
...
Donte
5 months ago
The key here is understanding how the swap1 and swap2 functions work. Once I've got that, I think I can logically work out the right answer.
upvoted 0 times
...
Felton
5 months ago
The key here is that the question says "maximum amount of time." That implies there's a limit, so I'm thinking option D or E are the best choices.
upvoted 0 times
...
Renea
5 months ago
For option C, I remember inelastic demand means that price changes don't really affect quantity demanded that much. So it seems off.
upvoted 0 times
...
Madonna
2 years ago
Brute-force, all the way. Though I do wonder if the hacker is using a really, really long password list. Like, did they just dump the entire 'Rockyou' database into their script? The suspense is killing me!
upvoted 0 times
...
Katina
2 years ago
I believe it's brute-force because it's trying multiple passwords to gain access.
upvoted 0 times
...
Dusti
2 years ago
Brute-force, hands down. I can already hear the script running in the background, trying 'password123' for the 100th time. Hackers these days have no creativity.
upvoted 0 times
Katina
2 years ago
It's important to stay vigilant and keep up with the latest security measures.
upvoted 0 times
...
Phyliss
2 years ago
I always make sure to use strong, unique passwords to protect my accounts.
upvoted 0 times
...
Ciara
2 years ago
It's scary how easily some systems can be breached with weak passwords.
upvoted 0 times
...
Susy
2 years ago
I agree, brute-force attacks are so common because they are effective.
upvoted 0 times
...
...
Rolande
2 years ago
I'm not sure, could it be phishing instead?
upvoted 0 times
...
Louis
2 years ago
Ooh, I know this one! It's a brute-force attack, no doubt. Gotta love how the options include 'DoS' and 'SQL injection' just to throw us off. Nice try, exam writers!
upvoted 0 times
...
Elza
2 years ago
I agree with Lilli, using common passwords sounds like brute-force.
upvoted 0 times
...
Rosalind
2 years ago
Bro, it's gotta be the brute-force attack. Trying all the common passwords? Classic move. I bet they're using a dictionary attack too, just for extra annoyance.
upvoted 0 times
Yesenia
1 year ago
They're probably just hoping someone hasn't changed their password from the default.
upvoted 0 times
...
Art
1 year ago
I agree, using common passwords and a dictionary attack is a classic method for gaining access.
upvoted 0 times
...
Rusty
2 years ago
Yeah, brute-force is definitely the way to go for this kind of attack.
upvoted 0 times
...
Luz
2 years ago
Brute-force all the way. They're not even trying to be subtle about it, just bombarding the system with password guesses.
upvoted 0 times
...
Pamella
2 years ago
I agree, using common passwords and a dictionary attack is a classic brute-force move. They're persistent for sure.
upvoted 0 times
...
Gracia
2 years ago
Yeah, definitely sounds like a brute-force attack. They're just throwing everything at the system until something sticks.
upvoted 0 times
...
...
Tasia
2 years ago
Hmm, this one's tricky. I'm torn between brute-force and phishing. Gotta be careful with those crafty hackers these days.
upvoted 0 times
...
Phung
2 years ago
Definitely a brute-force attack. I learned that in my cybersecurity class. Those script kiddies better watch out!
upvoted 0 times
Kerrie
2 years ago
That's why it's crucial to use unique and complex passwords to prevent unauthorized access.
upvoted 0 times
...
Frederica
2 years ago
I heard that some attackers use automated tools to try thousands of passwords until they find the right one.
upvoted 0 times
...
Solange
2 years ago
It's important to have strong passwords to protect against these types of attacks.
upvoted 0 times
...
Odelia
2 years ago
Yes, you're right. Brute-force attacks are common and can be very effective.
upvoted 0 times
...
...
Lilli
2 years ago
I think the attack being performed is brute-force.
upvoted 0 times
...

Save Cancel