Solved

Which of the Following Is Directly Exploited by a Brute-Force

Question 66

Multiple Choice

Which of the following is directly exploited by a brute-force attack?


A) The log file mechanisms that exist on the Web server
B) The Web server's available bandwidth
C) The TCP/IP software installed on the Web server
D) The Web server's authentication mechanisms

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions