Which of the following BEST describes attempts to guess a password by trying possible combination of letters, numbers, and symbols?

A. Social engineering
B. Phreaking
C. Brute force
D. War driving


Answer: C. Brute force

Computer Science & Information Technology

You might also like to view...

MysteryClass -first: int-second: double;+MysteryClass()+MysteryClass(int)+MysteryClass(double);+MysteryClass(int, double)+setData(int, double): void+getFirst(): int+getSecond(): double+doubleFirst(): int+squareSecond(): double+print(): void+equals(MysteryClass): boolean+makeCopy(MysteryClass): void+getCopy():MysteryClassAccording to the UML class diagram in the accompanying figure, which of the following is a data member?

A. MysteryClass B. print() C. second D. getFirst

Computer Science & Information Technology

The following sentence contains ________ errors.Daniel apply for an college nearby, and she choose to life at home.?

A. ?2 B. ?3 C. ?4 D. ?5

Computer Science & Information Technology

when someone who is unauthorized follows the employee through a secured entrance to a room or building

adware digital certificate grayware keylogger dictionary attack social engineering tailgating Trojan zombie worm

Computer Science & Information Technology

Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________.

A. technician, manager B. manager, engineer C. manager, technician D. technician, executive

Computer Science & Information Technology