ISC Exam Questions

What is the MOST effective method for gaining unauthorized access to a file protected with a long co

What is the MOST effective method for gaining unauthorized access to a file protected with a long
complex password?

A.
Brute force attack

B.
Frequency analysis

C.
Social engineering

D.
Dictionary attack