ethical-hacker video for bekcy, a cybersecurity science student, needs to fill in information into a secured PDF job application received from a prospective
Bekcy, a cybersecurity science student, needs to fill in information into a secured PDF job application received from a prospective employer. However, she is unable to enter any data because the fields are locked. Instead of requesting a new document, she decides to write a script that attempts to unlock the PDF by trying passwords from a list of commonly used passwords until the correct one is found or the list is exhausted. What type of attack is Becky attempting?