A security analyst is reviewing the following attack log output:
Which of the following types of attacks does this MOST likely represent?
A.
Rainbow table B.
Brute-force C.
Password-spraying D.
Dictionary.
C.
A security analyst is reviewing the following attack log output:
Which of the following types of attacks does this MOST likely represent?
A.
Rainbow table
B.
Brute-force
C.
Password-spraying
D.
Dictionary.
C.