#IT-6310
Awesome StudentQuestion • Network Security

It uses available resources, such as passwords or scripts.

Answer

unstructured attacks