You are called in to assist the police in an investigation involving a suspected drug dealer. The
suspects house was searched by the police after a warrant was obtained and they located a floppy
disk in the suspects bedroom. The disk contains several files, but they appear to be password
protecteD. What are two common methods used by password cracking software that you can use
to obtain the password?
A.
Limited force and library attack
B.
Brute Force and dictionary Attack
C.
Maximum force and thesaurus Attack
D.
Minimum force and appendix Attack