In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.
A. social engineering
B. brute force
C. dictionary
D. birthday
Answer: B
Computer Science & Information Technology
You might also like to view...
When the KeyPress event occurs, a character corresponding to the pressed key is sent to the KeyPress event's e parameter, which appears between the square brackets in the event's procedure header.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is a Smart Filter?
What will be an ideal response?
Computer Science & Information Technology
Microsoft ____ is full-featured Web site authoring program.
A. PowerPoint B. Word C. Expression Web 3 D. Excel
Computer Science & Information Technology
How did the Ethernet standard develop?
What will be an ideal response?
Computer Science & Information Technology