A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.
A. social engineering
B. brute force
C. dictionary
D. birthday
Answer: C
Computer Science & Information Technology
You might also like to view...
When a table is formatted with no borders, to view the cell boundaries, turn on the ________ feature
A) Borders B) Gridlines C) View Borders D) View Gridlines
Computer Science & Information Technology
An animation runs once when you first open the page in which it is contained.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What command would be used in Windows XP when there are multiple operating systems installed and the boot options are not correct?
A) bootcfg /rebuild B) boot.ini C) boot D) attrib
Computer Science & Information Technology
Create a main method for the class DatabaseManager that prints out the name and age of all the people who are under 30 in the database.
What will be an ideal response?
Computer Science & Information Technology