Uncategorized names of close relatives and the date when they married can also be used. This can be vulnerability because individuals are given opportunities to guess accounts password and use them(Bishop Posted by admin On May 30, 2025 0 comments 2003:68).