WGU Related Exams
Network-and-Security-Foundation Exam

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?