What type of attacks use every possible letter, number, and character found on a keyboard when cracking a password?
a. Brute-force
b. Dictionary
c. Profile
d. Statistics
ANSWER: a
You might also like to view...
Using a text editor write an HTML page that has a table in it. Use a browser to check that it is working. Then add the HTML for the table to the body of a homepage generated with the class WebPageWriter.
What will be an ideal response?
Which of the following PHP functions is useful to check whether a date is valid?
a. date_sub() b. date_modify() c. date_parse_from_format() d. checkdate()
Any field that is not part of the primary key is called a(n) ________
Fill in the blank(s) with correct word
Which of the following is FALSE about the 7 × 7 guideline for presentations?
A) It suggests that a maximum of seven transitions and seven animations should be used in a presentation. B) It suggests that you try to use no more than seven lines per slide. C) You may occasionally be forced to exceed this guideline. D) It suggests that you use no more than seven words per line.