14. An attacker uses software that continuously tries different combinations of characters to gain access to something password protected. What kind of attack is this?
16. Two people arrive at a building saying they are repair workers. An employee trusts them and lets them in. As soon as they have access to the building, they hack into a computer and steal confidential information. What kind of attack is this?