An attacker may use automatic brute forcing tool to compromise your ____________
(a) username
(b) employee ID
(c) system / PC name
(d) password
I have been asked this question during an interview.
This is a very interesting question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security