A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A. social engineering
B. brute force
C. dictionary
D. birthday


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements sorts an array named intValues?

a. Sort.Array(intValues) b. Sort(intValues) c. Sort.Array(intValues()) d. Array.Sort(intValues)

Computer Science & Information Technology

The ________ property of the XMLHttpRequest object is the numeric http status code returned by the server.

(a) statusText (b) status (c) statusCode (d) responseText

Computer Science & Information Technology

The tools for creating and publishing podcasts are within the reach of professionals only.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Double hashing solves collisions by ____.

A. rehashing the address B. joining to hashes generated with two different functions C. multiplying the hash value by 2 D. dividing the hash value by 2

Computer Science & Information Technology