1.2 Quiz: Password Attacks | AP Cybersecurity Unit 1
Topic 1.2 Quiz — Password Attacks
5 questions covering attack classification, hash storage vulnerabilities, NIST password policy, and layered defense analysis. Use the predict-first strategy on every question before reading the choices.
Which attack type is described, and why does the bank’s account lockout policy NOT prevent it?
- ADictionary attack, because the attacker is using a wordlist of probable passwords that bypasses lockout by staying below the threshold
- BPassword spraying, because only one password is tested per account, making it architecturally immune to per-account lockout
- CCredential stuffing, because the attacker submits one confirmed-working credential pair per account — never triggering lockout — and exploits password reuse rather than guessing
- DBrute force, because the attacker is systematically testing every possible combination of credentials from the leaked dataset at one attempt per account
A security auditor flags this implementation as flawed. Which of the following BEST identifies the weakness?
- AThe implementation is correct — prepending the username creates a unique value for each user, which is functionally equivalent to a proper salt and fully protects against precomputed attacks
- BUsernames are deterministic and publicly known, so an attacker can precompute a targeted rainbow table per username — and SHA-256’s speed makes offline brute force practical; a randomly generated per-user salt and a slow algorithm like bcrypt are both required
- CThe flaw is that SHA-256 should be replaced with MD5, which is a more modern algorithm designed specifically for password storage
- DThe username prepend is insecure only because usernames contain special characters that corrupt the hash function input
Which statement MOST accurately identifies the policy flaw and its security consequence?
- AThe policy is sound; the employees are failing to comply, so the solution is stricter enforcement and disciplinary action for predictable passwords
- BThe flaw is the 10-character minimum; NIST recommends exactly 8 characters with maximum complexity requirements to prevent guessing
- CThe policy is flawed only because it permits special symbols, which actually reduce keyspace by narrowing what characters users choose
- DThe forced 60-day rotation violates NIST SP 800-63B, which recommends against periodic rotation because it predictably causes users to make minimal incremental changes that an attacker who knows the pattern can easily enumerate
A security engineer proposes three changes after a breach:
II. Add a mandatory 90-day password rotation policy so that even if a password is cracked from the stolen hash database, the cracked credential will only be valid for a maximum of 90 days.
III. Deploy per-user randomly generated salts so that two users with identical passwords produce completely different stored hashes, defeating precomputed lookup table attacks.
Which statements describe changes that would genuinely improve resistance to the attacks they claim to address?
- AI only — bcrypt is the only meaningful improvement; salting and rotation have no impact on offline cracking
- BI and II only — bcrypt slows offline cracking and rotation limits credential validity windows
- CI and III only — bcrypt genuinely slows offline brute force and random salts genuinely defeat rainbow table precomputation; forced rotation is counterproductive per NIST SP 800-63B because it drives predictable incremental passwords
- DI, II, and III — all three changes provide independent layers of defense against offline cracking attacks
• Passwords are stored as bcrypt hashes with unique per-user salts (cost factor 10)
• Employee accounts have no MFA
• The default onboarding password is “Welcome2026!” and 23% of accounts have never changed it
• 61% of employees reuse their hospital password for personal email, based on a voluntary survey
• Account lockout triggers after 8 failed attempts per account
The tester has: (a) a LinkedIn scrape of all 1,400 employee emails, and (b) 400 million credential pairs from the 2024 breach of a national pharmacy chain.
Which MOST accurately identifies the attacks available to the tester AND the single control with the broadest impact across all viable attacks?
- ARainbow table attack against the bcrypt hashes and credential stuffing using the pharmacy breach data; switching to Argon2 would defend against both
- BBrute force against the bcrypt hashes and password spraying using the default credential; increasing the lockout threshold from 8 to 3 attempts would defend against both
- CPassword spraying using the default credential and dictionary attack against weak passwords; deploying bcrypt would defend against both since it slows all password-based attacks
- DPassword spraying using “Welcome2026!” against all 1,400 accounts and credential stuffing using the pharmacy breach data; MFA is the broadest single defense because it stops both attacks even when the attacker has the correct password
Get in Touch
Whether you're a student, parent, or teacher — I'd love to hear from you.
Just want free AP CS resources?
Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.
Message Sent!
Thanks for reaching out. I'll get back to you within 24 hours.
tanner@apcsexamprep.com
Courses
AP CSA, CSP, & Cybersecurity
Response Time
Within 24 hours
Prefer email? Reach me directly at tanner@apcsexamprep.com