Which of the following is directly exploited by a brute-force attack?
A.
The log file mechanisms that exist on the Web server
B.
The Web server’s available bandwidth
C.
The TCP/IP software installed on the Web server
D.
The Web server’s authentication mechanisms