An __________________ attack employs brute-force methods to compromise, degrade, or destroy systems, networks, or services - for example, a DDoS attack intended to impair or deny access to a service or application or a brute-force attack against an authentication mechanism.
a. insider
b. external
c. security
d. exclusive