Attempting to determine a password that is not known to the attacker is often called ____.

A. brute force
B. hacking
C. cracking
D. spamming


Answer: C

Computer Science & Information Technology

You might also like to view...

Once you no longer need a rule, you should delete it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In military time, 15:00 is ________ in non-military time

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case 4-1Carter has written a program that has some errors that he needs to fix.Carter realizes that the loop in his program goes around once more than necessary, meaning that he has a(n) ____ error.

A. termination B. count-controlled C. off-by-one D. infinite loop

Computer Science & Information Technology

A _____ is a proactive effort to anticipate a risk and describe an action plan to deal with it.

A. risk identification plan B. risk response plan C. risk balance plan D. risk management plan

Computer Science & Information Technology