A ____ attack is time-intensive, so they are rarely aimed at the target system in general.

A. dictionary
B. war dialer
C. brute-force
D. rainbow


Answer: C

Computer Science & Information Technology

You might also like to view...

After you enter and save contact information, that information is available as you compose ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies one specific user?

A. user name B. password C. client D. cycle

Computer Science & Information Technology

Which of the following utilities will produce the results printed below? TCP Certs03:1072 172.31.0.78:3389 Established

A. netstat B. arp C. ping D. tracert

Computer Science & Information Technology

What is the output of the following code?

``` #include using namespace std; int main() { int matrix[4][4] = {{1, 2, 3, 4}, {4, 5, 6, 7}, {8, 9, 10, 11}, {12, 13, 14, 15}}; int sum = 0; for (int i = 0; i < 4; i++) cout << matrix[i][1] << " "; return 0; } ``` A. 3 6 10 14 B. 1 3 8 12 C. 1 2 3 4 D. 4 5 6 7 E. 2 5 9 13

Computer Science & Information Technology