What is a dictionary attack?

What will be an ideal response?


A dictionary attack begins with the attacker creating digests of common dictionary words as candidates and then comparing them against those in a stolen digest file. Dictionary attacks can be successful because users often create passwords that are simple dictionary words.

Computer Science & Information Technology

You might also like to view...

The __________, also known as the address operator, returns the memory address of a variable.

a. asterisk (* ) b. ampersand ( & ) c. percent sign ( % ) d. exclamation point ( ! ) e. None of these

Computer Science & Information Technology

The first step in creating the initial form is to:

A) use the Ctrl key to select multiple fields and then add them all at once to a blank form. B) drag the fields to the blank form one at a time. C) click the Blank Form icon in the Create tab of the Ribbon. D) click the plus sign next to the table to show all the fields in this table.

Computer Science & Information Technology

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?

A. run B. watch C. do D. while

Computer Science & Information Technology

Another name for RAID 1 is ________.

A. striping B. mirroring C. doubling D. distributed parity

Computer Science & Information Technology