Compare brute-force attacks and dictionary attacks.

What will be an ideal response?


Brute-force attacks take place by guessing passwords and keys. Potential intruders use a brute-force approach to guess encryption keys - that is, using every possible combination of characters until the correct one is found. This type of attack can crack any key, given the time to do so. By contrast, a dictionary attack uses a dictionary file to try to guess a user's password. This type of attack is limited to words supplied in the dictionary file, so the password might never be discovered. A brute-force attack, on the other hand, uses all combinations of characters until a key is found, although doing so might take considerable time.

Computer Science & Information Technology

You might also like to view...

Control objects and code objects share many things in common. Which of the following statements applies only to control objects (in other words, which of the following statements does not apply to code objects)?

(A) these objects have properties (B) these objects are predefined and have physical manifestations (C) these objects respond to methods (D) these objects are an encapsulation of data and procedures that act on the data

Computer Science & Information Technology

The y -axis of the waveform view represents the ______.

A. amplitude value B. frequency C. time

Computer Science & Information Technology

Give one example of a task for which you would not write a program, and give another example of a task for which you would write a program.

What will be an ideal response?

Computer Science & Information Technology

Computer hardware devices need which of the following items to communicate with the computer?

A) drivers B) RAM C) cables D) video card

Computer Science & Information Technology