In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.
A. DoS
B. brute force
C. dictionary
D. rogue AP
Answer: C
You might also like to view...
Create a JavaFX application that draws the following picture of a magic wand, using polygons and polylines:
This project implements a simple application that draws a picture of a magic wand. It is designed to demonstrate the use of strokePolygon with arrays. The solution also use strokePolyline to outline the figures in black. Creating and testing it iteratively is strongly recommended.
Which of the following is NOT an advantage of organizing files?
A) It allows for file sharing between users. B) It allows for quicker backup of important data. C) It separates users' data when using a shared computer. D) It stores all files in alphabetical order.
Elements (or fields) are categorized as either:
What will be an ideal response?
SharePoint ________ is a cloud-based service that enables people and organizations to collaborate, store, and manage documents within the organization and to provide a public Web site
A) Foundation 2013 B) Designer 2013 C) Online 2013 D) Server 2013