A malicious user has gained access to several user accounts by guessing their password. The malicious user was able to guess passwords using a list of commonly used phrases and words. Which of the following terms best describes this type of attack?
Windows Operating Systems | |
Other Operating Systems & Technologies | |
Security | |
Software Troubleshooting | |
Operational Procedures |