Prepare for your Digital Forensic Certification Exam with engaging quizzes. Utilize flashcards and multiple-choice questions to enhance your understanding and readiness!

Practice this question and more.


What type of attack did Don perform when he used a trial-and-error method to access Johana's email account?

  1. Trojan horse attack

  2. SQL injection attack

  3. Brute-force attack

  4. Phishing attack

The correct answer is: Brute-force attack

The scenario described involves Don using a trial-and-error method to gain access to Johana's email account, which aligns with a brute-force attack. In a brute-force attack, an attacker systematically attempts numerous possible passwords or combinations until the correct one is found. This can involve trying common passwords, variations of them, or using automated tools to expedite the process. Brute-force attacks exploit the lack of strong security measures, such as weak passwords or insufficient account lockout policies. Therefore, when Don employs this method to access the email account, it directly characterizes his actions as a brute-force attack. In contrast, a Trojan horse attack involves malicious software that deceives users into thinking it's benign, typically installed unknowingly. An SQL injection attack targets databases by inserting malicious code into queries, not applicable in this context where email credentials are being guessed. Phishing attacks involve tricking users into providing their credentials through deceptive communications, rather than attempting to guess their passwords directly. Thus, the nature of the attack Don performed is indeed a brute-force attack, making that the correct classification.