A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?
Brute Force Attack
Zero Day Attack