While conducting a review of the system logs, a user had attempted to log onto the network over 250 times. Which of the following type of attacks is MOST likely occurring?
A.
Brute force
B.
Phishing
C.
Spamming
D.
DNS spoofing
While conducting a review of the system logs, a user had attempted to log onto the network over 250 times. Which of the following type of attacks is MOST likely occurring?
While conducting a review of the system logs, a user had attempted to log onto the network over 250 times. Which of the following type of attacks is MOST likely occurring?
A.
Brute force
B.
Phishing
C.
Spamming
D.
DNS spoofing