GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 182


What password attack uses a stolen password breach list?

Show Answer
Correct Answer: A

Credential stuffing is a type of cyberattack where attackers use a list of stolen usernames and passwords (often obtained from data breaches) to gain unauthorized access to user accounts. The attackers automate the process of entering these credentials into various websites, hoping that the same username and password pair will be reused on multiple sites. This attack specifically uses stolen password breach lists, making it the correct answer.

Discussion

1 comment
Sign in to comment
RezaeeOption: A
Jan 31, 2024

A. Credential Stuffing