An attacker tries to guess a user’s password using which of the following techniques?

a. Password sniffing
b. Password cracking
c. Password sampling
d. Password interrogation


b. Password cracking

Computer Science & Information Technology

You might also like to view...

____ can be used to keep a virtual eye on children and pets.

A. Mobile locating B. Real-time locating systems C. GPS D. Cell phones

Computer Science & Information Technology

What is a CDN and what is its goal?

What will be an ideal response?

Computer Science & Information Technology

The ________ function can be used to perform a single condition summary

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) _________________________ is a named location on a storage medium that usually contains related documents.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology