A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH
attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of
the following BEST explains this behavior?
A. Rainbow table attack
B. Password spraying
C. Logic bomb
D. Malware bot
attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of
the following BEST explains this behavior?
A. Rainbow table attack
B. Password spraying
C. Logic bomb
D. Malware bot