What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
A. Space division
B. Brute force
C. Known ciphertext
D. Known plaintext
Answer: B
You might also like to view...
The _________ of a class are also called the public services or the public interface of the class.
a) public constructors b) public instance variables c) public methods d) All of the above
You can use the Control Panel to add a new program in Windows 7
Indicate whether the statement is true or false
Along with an IP address, a computer needs a default gateway, which determines which part of an IP address identifies the local network and which part identifies the host
Indicate whether the statement is true or false
A type of attack that embeds JavaScript functions into HTML data elements so that pages can be redirects to other Web sites without the user knowing.
A. Buffer overflows B. SQL code injection C. Back door D. Cross-site scripting