An attacker tries to guess a user’s password using which of the following techniques?
a. Password sniffing
b. Password cracking
c. Password sampling
d. Password interrogation
b. Password cracking
Computer Science & Information Technology
You might also like to view...
____ can be used to keep a virtual eye on children and pets.
A. Mobile locating B. Real-time locating systems C. GPS D. Cell phones
Computer Science & Information Technology
What is a CDN and what is its goal?
What will be an ideal response?
Computer Science & Information Technology
The ________ function can be used to perform a single condition summary
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) _________________________ is a named location on a storage medium that usually contains related documents.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology