The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A. dictionary
B. brute force
C. computed hash
D. linear hash


Answer: B

Computer Science & Information Technology

You might also like to view...

A variable must be ____, which means you need to specify what type of data it can contain.

A. typed B. batched C. coded D. valued

Computer Science & Information Technology

You usually edit task relationships in ____ view.

A. Gantt Chart B. Network Diagram C. Calendar D. Either A or B

Computer Science & Information Technology

AUI stands for which of the following?

A) Attachment unit interconnect B) Auxiliary unity interconnect C) Auxiliary unit interface D) Attachment unit interface E) None of these answers are correct.

Computer Science & Information Technology

You can have only one double-colon notation within any IPv6 address

Indicate whether the statement is true or false

Computer Science & Information Technology