hardmultiple choiceObjective-mapped

A security analyst is reviewing firewall logs and notices repeated connection attempts from a single external IP address to multiple internal IP addresses on TCP port 22 (SSH). Each attempt uses a different username but the same password: 'Spring2024!'. The attempts occur sporadically over a 12-hour period. Which type of attack is most likely being observed?

Question 1hardmultiple choice
Full question →

A security analyst is reviewing firewall logs and notices repeated connection attempts from a single external IP address to multiple internal IP addresses on TCP port 22 (SSH). Each attempt uses a different username but the same password: 'Spring2024!'. The attempts occur sporadically over a 12-hour period. Which type of attack is most likely being observed?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Brute-force attack

Incorrect. A brute-force attack typically tries many different passwords against a single username to guess the correct one. The scenario uses a single password across multiple usernames, which is not characteristic of brute-force.

B

Distractor review

Dictionary attack

Incorrect. A dictionary attack uses a list of common passwords against a single account. Here, the attacker uses the same password repeatedly but targets many different accounts, which is not a dictionary attack.

C

Best answer

Password spraying attack

Correct. Password spraying involves an attacker trying a small number of commonly used passwords against many different accounts to avoid lockout and evade detection. The use of a single password against many usernames exactly matches this technique.

D

Distractor review

Man-in-the-middle attack

Incorrect. A man-in-the-middle attack involves an attacker intercepting and potentially altering communications between two parties. The log entries show direct connection attempts, not intercepted traffic.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Password spraying attack — The attack pattern involves trying a single common password against many different usernames, which is the hallmark of a password spraying attack. This technique is often used to avoid account lockouts that would occur if multiple passwords were tried against a single account. The correct answer is password spraying because the attacker uses one password (or a small set) across many usernames, not multiple passwords against one user (brute-force) or a list of common passwords against one user (dictionary). A man-in-the-middle attack would involve intercepting traffic, not repeated login attempts.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.