Network+ Pop Quiz: Maybe I’ll read it againWhich of the following would best describe the process of using a set of common words to identify a user's password? A) DDoS B) Social engineering C) Zero-day D) Brute force E) MitM F) I'm on chapter three, and I realize I've already read this book