Which of the following is directly exploited by a brute-force attack?

Which of the following is directly exploited by a brute-force attack?

Which of the following is directly exploited by a brute-force attack?

A.
The log file mechanisms that exist on the Web server

B.
The Web server’s available bandwidth

C.
The TCP/IP software installed on the Web server

D.
The Web server’s authentication mechanisms



Leave a Reply 0

Your email address will not be published. Required fields are marked *