In a certain website, a secure login feature is designed to prevent brute-force attack by implementing account lockout mechanism. The account will automatically be locked after five failed attempts. This feature will not allow the users to login to the website until their account is unlocked. However, there is a possibility that this security feature can be abused to perform __________ attack.
To enable the struts validator on an application, which configuration setting should be applied in the struts validator configuration file?
The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________
Identify the type of attack depicted in the figure below: