Which of the following can be used by a security administrator to successfully recover a
user’s forgotten password on a password protected file?
A.
Cognitive password
B.
Password sniffing
C.
Brute force
D.
Social engineering
Which of the following can be used by a security administrator to successfully recover a
user’s forgotten password on a password protected file?
Which of the following can be used by a security administrator to successfully recover a
user’s forgotten password on a password protected file?
A.
Cognitive password
B.
Password sniffing
C.
Brute force
D.
Social engineering