A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A. social engineering
B. brute force
C. dictionary
D. birthday


Answer: C

Computer Science & Information Technology

You might also like to view...

When a table is formatted with no borders, to view the cell boundaries, turn on the ________ feature

A) Borders B) Gridlines C) View Borders D) View Gridlines

Computer Science & Information Technology

An animation runs once when you first open the page in which it is contained.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What command would be used in Windows XP when there are multiple operating systems installed and the boot options are not correct?

A) bootcfg /rebuild B) boot.ini C) boot D) attrib

Computer Science & Information Technology

Create a main method for the class DatabaseManager that prints out the name and age of all the people who are under 30 in the database.

What will be an ideal response?

Computer Science & Information Technology