What best describes a brute-force attack?
A. breaking and entering into a physical building or network closet
B. an attacker’s attempt to decode a cipher by attempting each possible key combination to find the correct one
C. a rogue DHCP server that is posing as a legitimate DHCP server on a network segment
D. an attacker inserting itself between two devices in a communication session and then taking over the session.