Someone hacks into your information system and discovers a file of apparently critical information to your organizations performance. this file contains false information and has been placed in the system by the organization as a decoy. this file is an example of:

Respuesta :

An attack that exhausts all possible password combinations in order to break into an account best describes: brute-force attackYou are trying to log in to your bank account. You are requested to enter your mother's maiden name. This is an example of: challenge question