An attack in which a person try to crack passwords by using a combination of letters, numbers, and symbols again and again until successful.

What will be an ideal response?


brute force

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsCase 1-1Angela is creating a presentation to give at her company's annual picnic. She knows that PowerPoint 2013 offers new themes she can apply to her presentation to give it a fun and exciting look. How can Angela display a gallery of available themes? a. press the F5 keyc. click the More button in the Themes groupb. click the Gallery button in the Themes groupd. press the F1 key

What will be an ideal response?

Computer Science & Information Technology

Which keyboard shortcut key opens the Spelling & Grammar feature?

A) F12 B) F7 C) F4 D) F2

Computer Science & Information Technology

What does the Send to OneNote option publish?

A) An open file from a desktop application B) A PowerPoint presentation saved on your flash drive C) A screen clip in the Pictures Library D) A web page saved as a file on your computer

Computer Science & Information Technology

To print multiple contact records, you must first filter the contacts to display only the contacts that you want to print.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology