What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?
A. character set attack
B. binary attack
C. mask attack
D. rule attack
Answer: D
Computer Science & Information Technology
You might also like to view...
Define the term gateway.
What will be an ideal response?
Computer Science & Information Technology
When the TDC is bound to an element, the element's DATASRC attribute should be set to ________.
a) the name of the TDC object preceded by a user defined character b) the filename containing the data c) the field name that the data is in d) the name of the TDC object preceded by a #
Computer Science & Information Technology
All string objects are _______.
a) the same size b) always equal to each other c) preceded by at least one whitespace character d) immutable
Computer Science & Information Technology
Use the View Side by Side command to display two open documents next to each other in separate windows
Indicate whether the statement is true or false
Computer Science & Information Technology