A hacker runs a program that tries numerous character combinations until it stumbles
on the correct combination and cracks the key. What offensive strategy is this program
using?
a. Brute force attack
b. Zero-day exploit
c. CIA triad
d. Endpoint security vulnerability
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here