Question: In _ _ _ _ _ _ _ attack, hackers use lists of stolen usernames and passwords in combination on various accounts, automatically trying over
In attack, hackers use lists of stolen usernames and passwords in combination on various accounts, automatically trying over and over until they hit a match.
Question options:
keylogger
password spraying
phishing
credential stuffing
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
