What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?

A. character set attack
B. binary attack
C. mask attack
D. rule attack


Answer: D

Computer Science & Information Technology

You might also like to view...

Define the term gateway.

What will be an ideal response?

Computer Science & Information Technology

When the TDC is bound to an element, the element's DATASRC attribute should be set to ________.

a) the name of the TDC object preceded by a user defined character b) the filename containing the data c) the field name that the data is in d) the name of the TDC object preceded by a #

Computer Science & Information Technology

All string objects are _______.

a) the same size b) always equal to each other c) preceded by at least one whitespace character d) immutable

Computer Science & Information Technology

Use the View Side by Side command to display two open documents next to each other in separate windows

Indicate whether the statement is true or false

Computer Science & Information Technology