Basic: Which of the following best describes a brute force attack?
-
A
Exploiting a software vulnerability to gain unauthorized access
-
B
Flooding a system with traffic to overwhelm it
-
C
Attempting all possible password combinations to gain access
-
D
Impersonating a trusted entity to steal information