What is a dictionary attack?
What will be an ideal response?
A dictionary attack begins with the attacker creating digests of common dictionary words as candidates and then comparing them against those in a stolen digest file. Dictionary attacks can be successful because users often create passwords that are simple dictionary words.
You might also like to view...
The __________, also known as the address operator, returns the memory address of a variable.
a. asterisk (* ) b. ampersand ( & ) c. percent sign ( % ) d. exclamation point ( ! ) e. None of these
The first step in creating the initial form is to:
A) use the Ctrl key to select multiple fields and then add them all at once to a blank form. B) drag the fields to the blank form one at a time. C) click the Blank Form icon in the Create tab of the Ribbon. D) click the plus sign next to the table to show all the fields in this table.
Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute?
A. run B. watch C. do D. while
Another name for RAID 1 is ________.
A. striping B. mirroring C. doubling D. distributed parity