Match each item with a statement below.

A. Examines network traffic for known attack signatures
B. Composed of information commonly known about the individual
C. Uses a list of common passwords to try to crack an unknown password
D. Typically the most time consuming way to crack a password
E. The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature


A. Snort
B. Weak password
C. Dictionary attack
D. Brute force
E. Intrusion detection

Computer Science & Information Technology

You might also like to view...

Moving an item from one location to a new location on the screen while holding down the left mouse button is commonly referred to as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The receiver of a message need not be willing to accept messages in order for IM to work.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A shortcut menu sometimes is known as a(n) ____ menu.

a. embedded b. online c. sensitive d. context

Computer Science & Information Technology

The ____ operator is used to extract the address for a variable.

A. address (&)   B. assignment (=) C. indirection (*) D. pointer (^) E. selection (>)

Computer Science & Information Technology