Attacker acquires credentials from the password dump site. Automated tools are used to test credentials across a variety of different sites. When a successful login occurs, the attacker harvests the sensitive data. The given attack sequence corresponds to:

Credential Stuffing
Rainbow table attack
Brute Force Attack
Password Spraying
Verified Answer
Correct Option - a

To get all Infosys Certified Cyber Security Associate Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram