When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked.
 
What type of attack is he attempting?

A. Rainbow table
B. Dictionary
C. Zero-day
D. Phishing


Answer: B

Computer Science & Information Technology

You might also like to view...

H.264 is a video compression standard based on the _____ standard.

A. MPEG-1 B. MPEG-2 C. MPEG-3 D. MPEG-4

Computer Science & Information Technology

Which of the following is TRUE about flash memory?

A) It is faster than RAM. B) It can be plugged into a USB port. C) It has multiple moving parts. D) It requires constant power to store data.

Computer Science & Information Technology

The table Design view shows:

A) the number of records in the table. B) the structure of the table. C) the formatting applied to the table. D) the relationships established for the table.

Computer Science & Information Technology

What is the best way to make sure your worksheet prints on only one page?

A) Limit the amount of data you put on each worksheet B) Make the margins as small as possible C) Make the font sizes smaller D) Use the Fit to option

Computer Science & Information Technology