Jason is attempting to gain unauthorized access to a corporate server by running a program that
enters passwords from a long list of possible passwords. This type of attack is known as a:
A.
buffer overflow attack.
B.
forced-entry attack.
C.
denial-of-service attack.
D.
brute-force attack.