Which of the following cryptography attack methods is usually performed without the use of a computer?
Which of the following open source tools would be the best choice to scan a network for potential targets?