WGU Network-and-Security-Foundation Question Answer
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
WGU Network-and-Security-Foundation Summary
- Vendor: WGU
- Product: Network-and-Security-Foundation
- Update on: Feb 8, 2026
- Questions: 62

