Which of the following describes credential theft techniques?

Boost your skills with Zscaler Digital Transformation Administrator Exam prep. Use flashcards and multiple choice questions with hints and explanations to get exam ready!

The correct answer highlights several techniques commonly associated with credential theft. Keylogging, phishing, and spear phishing are direct methods used by attackers to compromise user credentials.

Keylogging involves capturing keystrokes made by a user, which can reveal passwords and other sensitive information as they are typed. Phishing is a broad practice where attackers send fraudulent communications, often via email, masquerading as a trustworthy source, to lure individuals into providing sensitive information. Spear phishing is a targeted form of phishing that focuses on specific individuals or organizations, making it even more deceptive and dangerous.

In contrast, the other options illustrate either security measures or practices aimed at protecting credentials rather than methods for stealing them. Physical security measures focus on safeguarding hardware and physical access to systems, thus are not credential theft techniques themselves. Developing stronger passwords can help resist credential theft but again, is more about protection than theft. Multi-factor authentication adds layers of defense, making it more difficult for attackers to gain access to accounts even if credentials are compromised, but it does not describe the act of stealing credentials.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy