Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What technique did Don use to access John's email account?

  1. Brute-force attack

  2. Phishing

  3. Dictionary attack

  4. Man-in-the-middle attack

The correct answer is: Dictionary attack

The technique that Don used to access John's email account is a dictionary attack. A dictionary attack involves systematically entering every word in a predefined list – or dictionary – of possible passwords to try and guess the correct one. This method relies on the idea that many users often choose simple or common passwords that can be found in such dictionaries. In the context of ethical hacking, understanding dictionary attacks is essential as it highlights the importance of creating strong, unique passwords that are not easily guessed or found in common lists. Effective defenses against this type of attack include employing complex passwords, using password managers, and enabling multi-factor authentication to add an additional layer of security beyond just the password itself. In contrast, the other techniques mentioned involve different methods of breaching security. Brute-force attacks, for example, involve trying every possible combination of characters until the correct one is found, which can be much slower. Phishing involves tricking users into providing their login credentials through deceptive emails or websites, while a man-in-the-middle attack involves intercepting communications between two parties to access private information. Each of these methods has its unique approach and context in cybersecurity.