Attempting to determine a password that is not known to the attacker is often called ____.
A. brute force
B. hacking
C. cracking
D. spamming
Answer: C
Computer Science & Information Technology
You might also like to view...
Once you no longer need a rule, you should delete it.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In military time, 15:00 is ________ in non-military time
Fill in the blank(s) with correct word
Computer Science & Information Technology
Case 4-1Carter has written a program that has some errors that he needs to fix.Carter realizes that the loop in his program goes around once more than necessary, meaning that he has a(n) ____ error.
A. termination B. count-controlled C. off-by-one D. infinite loop
Computer Science & Information Technology
A _____ is a proactive effort to anticipate a risk and describe an action plan to deal with it.
A. risk identification plan B. risk response plan C. risk balance plan D. risk management plan
Computer Science & Information Technology