New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 3 Question 46 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 46
Topic #: 3
[All GCIA Questions]

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, E, G, H

Contribute your Thoughts:

0/2000 characters
Markus
3 months ago
Not sure about the zero-day attack. Seems a bit over the top for this situation.
upvoted 0 times
...
Armanda
3 months ago
Brute force attack is possible too, but dictionary seems more likely here.
upvoted 0 times
...
Alana
3 months ago
Surprised he didn't use a stronger password. What was he thinking?
upvoted 0 times
...
Charlesetta
4 months ago
I think it could also be password guessing. Too easy to crack!
upvoted 0 times
...
Jerry
4 months ago
Definitely a dictionary-based attack. Using 'Faulkner' as a password is risky!
upvoted 0 times
...
Tamesha
4 months ago
I don't think a zero-day attack fits this scenario, but I could see how password guessing might work since 'Faulkner' is not very complex.
upvoted 0 times
...
Lavera
4 months ago
I feel like social engineering could be a factor too, especially if someone knew Andrew's personal info to guess his password.
upvoted 0 times
...
Trevor
4 months ago
I'm not entirely sure, but I think brute force attacks involve trying many combinations, which might apply here since the password is simple.
upvoted 0 times
...
Mammie
5 months ago
I remember studying about dictionary-based attacks, and 'Faulkner' seems like a common word that could be easily guessed.
upvoted 0 times
...
Arlette
5 months ago
This is a tricky one. I'm thinking the attacker might have used a rainbow attack, since that's a common way to crack simple passwords. But I could also see them trying a social engineering approach to get the password.
upvoted 0 times
...
Hildred
5 months ago
Hmm, I'm not sure about this one. There are a lot of options here, and I'm not sure which ones are the most likely. I'll have to think it through carefully.
upvoted 0 times
...
Arlette
5 months ago
This looks like a classic password cracking scenario. I'd start by considering dictionary-based attacks and password guessing, since the password seems pretty simple.
upvoted 0 times
...
Mary
5 months ago
Okay, let's see. The attacker was able to delete some of Andrew's emails, so that rules out a simple denial-of-service attack. I'd say it's probably a combination of dictionary-based and brute force attacks.
upvoted 0 times
...
Gerry
5 months ago
This seems like a straightforward automation problem. I'd probably go with option B and use Cloud Composer to create a DAG that runs the Python scripts on a schedule.
upvoted 0 times
...
Tomas
5 months ago
This question seems straightforward - we just need to figure out the key information the Solution Architect needs to design the solution.
upvoted 0 times
...
Arleen
5 months ago
I'm pretty sure the answer is A, Cryptanalysis. That's the process of analyzing cryptographic algorithms to try to break them and recover the original data. The other options don't seem to fit the description in the question.
upvoted 0 times
...

Save Cancel