Match each item with a statement below.
A. Examines network traffic for known attack signatures
B. Composed of information commonly known about the individual
C. Uses a list of common passwords to try to crack an unknown password
D. Typically the most time consuming way to crack a password
E. The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
A. Snort
B. Weak password
C. Dictionary attack
D. Brute force
E. Intrusion detection
You might also like to view...
Moving an item from one location to a new location on the screen while holding down the left mouse button is commonly referred to as ________
Fill in the blank(s) with correct word
The receiver of a message need not be willing to accept messages in order for IM to work.
Answer the following statement true (T) or false (F)
A shortcut menu sometimes is known as a(n) ____ menu.
a. embedded b. online c. sensitive d. context
The ____ operator is used to extract the address for a variable.
A. address (&) B. assignment (=) C. indirection (*) D. pointer (^) E. selection (>)