Which of the following describes a brute-force attack?
A.
An attacker resorts to manipulating an individual to obtain information.
B.
A n application uses a large text file to guess authentication information.
C.
An application attempts to guess authentication information by issuing a series of guesses
based on character sets and random letter patterns.
D.
A list that contains spouse names, pet names, common passwords and other words is
repeatedly consulted to guess authentication information.
Explanation: