Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 6 Question 28 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 28
Topic #: 6
[All GCFR Questions]

A threat actor conducts brute force attacks against SSH services to gain Initial access. This attack technique falls under which category of the Google Workspace MITRE ATT&CK matrix?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Sheldon
2 months ago
I'm going with B. Discovery. They're trying to find out information about the system, even if it's through a brute force attack. Credential access is too specific, in my opinion.
upvoted 0 times
...
Queen
2 months ago
Haha, 'sweet, sweet credentials' - love it, Darrel! But yeah, I agree, C is the way to go.
upvoted 0 times
Malcolm
1 months ago
Agreed, C is the category for gaining initial access through SSH services.
upvoted 0 times
...
Barb
1 months ago
Definitely, brute force attacks are all about getting those credentials.
upvoted 0 times
...
Marsha
1 months ago
C) Credential access
upvoted 0 times
...
...
Darrel
2 months ago
C definitely sounds right to me. Brute force attacks are all about getting those sweet, sweet credentials!
upvoted 0 times
...
Ernest
2 months ago
Hmm, I'm not so sure. Brute force attacks could also fall under Discovery, since they're trying to gain information about the system. Tough call.
upvoted 0 times
Leila
1 months ago
I'm leaning towards Credential access as well.
upvoted 0 times
...
Michal
2 months ago
Maybe it's a mix of both Credential access and Discovery.
upvoted 0 times
...
Rosio
2 months ago
I believe it could also be considered as Discovery.
upvoted 0 times
...
Teresita
2 months ago
I think it falls under Credential access.
upvoted 0 times
...
...
Herminia
2 months ago
I'm not sure, but I think it could also be A) Defense evasion because the attacker is trying to bypass security measures.
upvoted 0 times
...
Marg
2 months ago
I'm pretty sure the answer is C. Credential access seems like the most logical choice here.
upvoted 0 times
Princess
2 months ago
Definitely, it's important to protect against these types of attacks to prevent unauthorized access.
upvoted 0 times
...
Shawnda
2 months ago
Yeah, brute force attacks are all about trying to get access to login credentials.
upvoted 0 times
...
Julio
2 months ago
I think you're right. Credential access does make sense for brute force attacks.
upvoted 0 times
...
...
Harrison
3 months ago
I agree with Regenia. Brute force attacks are used to gain access to credentials.
upvoted 0 times
...
Regenia
3 months ago
I think the answer is C) Credential access.
upvoted 0 times
...

Save Cancel