Which of the following is directly exploited by a brute-force attack?
A) The log file mechanisms that exist on the Web server
B) The Web server's available bandwidth
C) The TCP/IP software installed on the Web server
D) The Web server's authentication mechanisms
Correct Answer:
Verified
Q10: Bi-directional text is a function of CSS2.
Q11: Which of the following is an acceptable
Q12: You are creating a Web site for
Q13: You are working for a financial services
Q14: Denny is designing a Web site for
Q16: Applying masks in Flash allows for the
Q17: Egon is a member of a site
Q18: You want to provide your visitors with
Q19: Which of the following is a standard
Q20: Certain Web sites are known to be
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents