In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.

A. social engineering
B. brute force
C. dictionary
D. birthday


Answer: B

Computer Science & Information Technology

You might also like to view...

When the KeyPress event occurs, a character corresponding to the pressed key is sent to the KeyPress event's e parameter, which appears between the square brackets in the event's procedure header.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is a Smart Filter?

What will be an ideal response?

Computer Science & Information Technology

Microsoft ____ is full-featured Web site authoring program.

A. PowerPoint B. Word C. Expression Web 3 D. Excel

Computer Science & Information Technology

How did the Ethernet standard develop?

What will be an ideal response?

Computer Science & Information Technology