Q2. A brute force attack is a type of cyber-attack that involves an attacker trying to gain access to a resource, such as a system, network, or application, by systematically trying every possible combination ✓ of usernames, passwords, and/or security questions. It is a trial-and-error method used by attackers to gain access to a resource, typically a system, network, or application. ✓
An example of a brute force attack would be an attacker trying to guess the password of a user account. This can be done by systematically trying every possible combination of letters, numbers, and symbols until the correct combination is discovered. Other examples include. basic re-phrasing of the description.
-
-
Correct example found/presented? BFA used how? not clear Measures that could be taken? X not really mentioned
-
-
-
BREACH
Unfortunately the breach itself was due to a developer using an insecure version of PLEX which was exploited. You did not present text clearly showing in your example that this exemplified brute-forcing. The customers were warned that the hackers may try to brute-force their uid/pwd combinations in their lastpass boxes. So the original breach was not brute-forced. But I will accept that the risk is brute-forcing of lastpass-customers’ data.
-