42. Tom, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about ten minutes. Which of the following techniques is used by Tom to obtain access to his victim's email?
(A) brute force attack
(B) denial-of-service attack
(C) pretexting
(D) spoofing
答案:登入後查看
統計: 尚無統計資料
統計: 尚無統計資料