ExamGecko
Question list
Search
Search

Related questions











Question 477 - 312-50v12 discussion

Report
Export

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters.

If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

A.
Side-channel attack
Answers
A.
Side-channel attack
B.
Denial-of-service attack
Answers
B.
Denial-of-service attack
C.
HMI-based attack
Answers
C.
HMI-based attack
D.
Buffer overflow attack
Answers
D.
Buffer overflow attack
Suggested answer: A
asked 18/09/2024
Ronald Armas
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first