A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access.
Which of the following types of attacks are MOST likely occurring? (Select two.)
A . Replay
B . Rainbow tables
C . Brute force
D . Pass the hash
E . Dictionary
Answer: CE