A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.
A. social engineering
B. brute force
C. dictionary
D. birthday
Answer: C
You might also like to view...
Which of the following statements sorts an array named intValues?
a. Sort.Array(intValues) b. Sort(intValues) c. Sort.Array(intValues()) d. Array.Sort(intValues)
The ________ property of the XMLHttpRequest object is the numeric http status code returned by the server.
(a) statusText (b) status (c) statusCode (d) responseText
The tools for creating and publishing podcasts are within the reach of professionals only.
Answer the following statement true (T) or false (F)
Double hashing solves collisions by ____.
A. rehashing the address B. joining to hashes generated with two different functions C. multiplying the hash value by 2 D. dividing the hash value by 2