Exam N10-008 All QuestionsBrowse all questions from this exam
Question 304

A user calls the IT department to report being unable to log in after locking the computer. The user resets the password, but later in the day the user is again unable to log in after locking the computer. Which of the following attacks against the user is MOST likely taking place?

    Correct Answer: A

    A brute-force attack involves an attacker systematically trying multiple combinations of passwords until the correct one is found. In this scenario, the user's account is repeatedly being locked after resetting the password, indicating that an attacker is likely attempting multiple incorrect login attempts, triggering a lockout policy. This pattern is characteristic of a brute-force attack where continuous attempts to login are causing the account to lock, rather than issues related to wireless connectivity or phishing.

Discussion
[Removed]Option: A

So many wrong answers on this dump. Its brute force. Someone is trying out passwords and locking your account. You have a 3 wrong password and lockout policy in Active Directory.

pedrwc7Option: A

Active Directory - IT Department resets the password Brute-Force Attack - Every time user comes back to their computer, users acount is being locked. With that being said, I would assume someone is trying to guess their password to access the user computer while the user is away. A. Brute-force - Tries every possible combination until they figure out the password B. On-path - Occurs when an attacker puts themselves between the victim and the intended destination C. Deauthentication - Attempts to interrupt communication between an end user and the wireless access point D. Phishing - Sending an email in an attempt to get a user to click a link. Sending out emails to capture the most people and doesn’t really target

BeauChateauOption: A

A. Brute-force attack is most likely taking place. A brute-force attack is a method of guessing a password by trying a large number of possible combinations until the correct one is found. In this scenario, the user reset the password, but it is still being guessed by the attacker, causing the user to be unable to log in after locking the computer.

BeauChateau

Deauthentication is a type of wireless attack that involves an attacker sending a disassociation packet to a wireless client, causing the client to disconnect from the wireless network. This type of attack would typically result in the user being unable to connect to the wireless network, but it would not typically cause issues with logging in after locking the computer. In this scenario, the user is reporting being unable to log in after locking the computer, which suggests that the issue may be related to the user's account or the computer's login settings, rather than a wireless connectivity issue.

Doaa81Option: A

In this question, they didn't explain whether this computer is on an Ethernet connection or a wireless connection. Deauthentication interrupts communication between an end user and the wireless access point. Only brute-force attacks can cause this issue.

famcoOption: A

Trick on DeaAuth. It is definitely BruteForce that causes the account to lock out. What a bad question. The only purpose is the play on Deauthentication

StellarSteveOption: A

SKIDADDLE SKADOODLE If you dont pick A you are a NOODLE.

233MatisOption: C

Deauthentication attacks target the communication between a user's device and the network it is connected to. When a user locks their computer, the computer may disconnect from the network. If a deauthentication attack is taking place, an attacker may be sending deauthentication packets to the user's device, causing it to disconnect from the network and making it difficult for the user to log back in.

MelzTheArtistOption: C

Based on the information given, the most likely attack taking place is a Deauthentication attack. In a Deauthentication attack, an attacker sends deauthentication packets to a target device in order to disconnect it from its current network. This can result in the target device losing its connection and being unable to log in again until the connection is reestablished. In this scenario, it is possible that the attacker is using a Deauthentication attack to disrupt the user's connection after the user locks the computer, resulting in the inability to log in after resetting the password.

HeylingOption: C

The correct answer is C. Deauthentication. Here's why: The user is able to log in initially, but after locking the computer, they are unable to log in again. This suggests that the issue is not with the password itself, but rather with the authentication process.

toffer96Option: A

I think the key here is 'unable to log in after locking the computer'. Deauthentication can happen as you're actively using a wireless device.

ozil786Option: C

ChatGBT says C is correct but not sure

AK4U_111Option: A

the answer here is actually a dictionary attack, but since it is not listed, i would say bruteforce

vinbra

I could have your username and start trying random passwords. You dont need a dictionary to block someone else account

CherubaelOption: B

The only thing that throws me off is the fact that brute force takes FOREVER and the fact that this attacker is able to get the password that SAME DAY doesn't really add up to me 😂 Honestly On-Path would make more sense given how if it was lets say LDAP which is unencrypted plaintext by default (Unless you do SLDAP).

Juliana1017Option: A

correct answer is A

gho5tfaceOption: A

Boo Boo, the ghost says A!

Ali3ngazerOption: A

It's A, guys the computer is LOCKED OUT after someone tried to gain access to the user's computer after he LOCKED the computer. That is Brute-Force. It is not C because Deauthenication is for ONLY WIRELESS devices and in this question, they do not specify if the user's computer is connected wirelessly or thru Ethernet.

BenBen1234Option: C

I'm also going to go with C. A brute-force attack will most likely happen after deauthentication was performed. I read several articles and this one was the best. It tells you how to deauthenticate someone and explain. Scroll all the way in the bottom and read after Phishing attacks. Hopefully this helps https://hackernoon.com/forcing-a-device-to-disconnect-from-wifi-using-a-deauthentication-attack-f664b9940142

BenBen1234

Disregard. This answer! I was reading too fast. The user never got kicked off the network. Hence why i went C.

BenBen1234

If the person was getting kicked off the network and not being able to log in I would say Deauthentication. My apologies.