Question 8 of 300
mediummultiple choiceObjective-mapped

GCDL Practice Question: An enterprise's security team is implementing a…

This GCDL practice question tests your understanding of an enterprise's security team is implementing a…. The scenario asks you to isolate a root cause — eliminate options that address a different problem before choosing. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.

An enterprise's security team is implementing a strategy to protect against 'credential stuffing' attacks — where attackers use lists of username/password combinations from previous data breaches to try to log in to the company's applications. Which authentication control most effectively mitigates this threat?

Question 1mediummultiple choice
Full question →

An enterprise's security team is implementing a strategy to protect against 'credential stuffing' attacks — where attackers use lists of username/password combinations from previous data breaches to try to log in to the company's applications. Which authentication control most effectively mitigates this threat?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Multi-Factor Authentication (MFA/2SV), which requires a second verification factor beyond the password that attackers don't have even when they possess the stolen credentials

MFA is the definitive defense against credential stuffing. The stolen credentials work for the first factor (password), but the attack fails at the second factor (authenticator app TOTP, push notification, hardware security key). Attackers would need both the credentials AND access to the user's second factor device — a much higher bar.

B

Distractor review

Encrypting passwords in the company's database using bcrypt to prevent the stolen passwords from being usable

Encrypting/hashing passwords in the company's own database protects against an attacker stealing the company's database. Credential stuffing uses credentials stolen from other breached sites where users reused passwords. The company's own password storage is not the attack vector.

C

Distractor review

Requiring longer, more complex passwords to make credentials harder to guess

Credential stuffing uses real, previously stolen credentials — not guesses. Password complexity requirements don't help because the attacker already has working username/password pairs from previous breaches.

D

Distractor review

Implementing HTTPS on the login page to prevent credentials from being intercepted in transit

HTTPS protects credentials during transmission. Credential stuffing doesn't intercept credentials in transit — it uses previously stolen credentials from other breaches. HTTPS doesn't prevent replay of already-stolen credentials.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Key takeaway

NAT direction and interface roles matter as much as the IP address mapping. Inside/outside designation controls which traffic is translated.

Related practice questions

Related GCDL practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Practice this exam

Start a free GCDL practice session

Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.

FAQ

Questions learners often ask

What does this GCDL question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Multi-Factor Authentication (MFA/2SV), which requires a second verification factor beyond the password that attackers don't have even when they possess the stolen credentials — Credential stuffing attacks rely on reused username/password combinations. Multi-Factor Authentication (MFA/2SV) is the most effective mitigation because even if the attacker has the correct username and password, they cannot complete authentication without the second factor (authenticator app, hardware key, SMS code). Passwords alone cannot defend against credential stuffing since the attacker has the actual credentials.

What should I do if I get this GCDL question wrong?

Review the four NAT address types (inside local, inside global, outside local, outside global), PAT port overload, and static vs dynamic NAT use cases. Then practise related GCDL NAT questions on configuration and troubleshooting.

About these practice questions

Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →

How Courseiva writes practice questions · Editorial policy

Discussion

Loading comments…

Sign in to join the discussion.

This GCDL practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the GCDL exam.