Exam GCIH All QuestionsBrowse all questions from this exam
Question 182

What password attack uses a stolen password breach list?

    Correct Answer: A

    Credential stuffing is a type of cyberattack where attackers use a list of stolen usernames and passwords (often obtained from data breaches) to gain unauthorized access to user accounts. The attackers automate the process of entering these credentials into various websites, hoping that the same username and password pair will be reused on multiple sites. This attack specifically uses stolen password breach lists, making it the correct answer.

Discussion
RezaeeOption: A

A. Credential Stuffing