Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected file?
A.
Cognitive password
B.
Password sniffing
C.
Brute force
D.
Social engineering
Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected file?
Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected file?
A.
Cognitive password
B.
Password sniffing
C.
Brute force
D.
Social engineering