In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A. social engineering
B. brute force
C. dictionary
D. birthday


Answer: B

Computer Science & Information Technology

You might also like to view...

A car has many __________, such as its color, the number of doors, the amount of gas in its tank, its current speed and its odometer reading.

a) methods b) messages c) attributes d) clients

Computer Science & Information Technology

Talk about some of the current applications for robots. What may robots do for us in the future?

What will be an ideal response?

Computer Science & Information Technology

If the node to be deleted has _____ we delete the node and attach the left subtree to the deleted node's parent.

A. only a left subtree B. only a right subtree C. has no children D. has two subtrees

Computer Science & Information Technology

Display faculty names in descending order by their department, but in alphabetical order by their name within each department.

Write queries/statements for the following. (Use tables created in Chapter 4 Lab Activity.)

Computer Science & Information Technology