1.What fundamentally distinguishes password spraying from brute force?
2.Why must the domain password policy be enumerated before spraying?
3.A domain has a lockout threshold of 5 and a 30-minute reset counter. What is a safe spray rate?
4.Why does a successful spray usually yield standard user accounts rather than Domain Admin access?
5.If the minimum password length is 14 characters with complexity enabled, why is 'Summer2024!' a poor spray candidate?
6.An interviewer asks: 'What would you do after a successful spray hit on a standard user account?' Which response demonstrates the strongest understanding?