Multiple Choice
Which of the following is directly exploited by a brute-force attack?
A) The log file mechanisms that exist on the Web server
B) The Web server's available bandwidth
C) The TCP/IP software installed on the Web server
D) The Web server's authentication mechanisms
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q61: Which of the following languages is used
Q62: Consuela is updating her company's Web site.
Q63: You are a member of a Web
Q64: Gordon has been asked to create a
Q65: The primary purpose of a plug-in is
Q67: Which of the following formats uses Extensible
Q68: You have created a style sheet and
Q69: Bi-directional text is a function of CSS2.
Q70: Homer has been asked to create a
Q71: You want to provide your visitors with