A ____ attack is time-intensive, so they are rarely aimed at the target system in general.
A. dictionary
B. war dialer
C. brute-force
D. rainbow
Answer: C
You might also like to view...
After you enter and save contact information, that information is available as you compose ____________________.
Fill in the blank(s) with the appropriate word(s).
What is the output of the following code?
```
#include
Which of the following is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies one specific user?
A. user name B. password C. client D. cycle
Which of the following utilities will produce the results printed below? TCP Certs03:1072 172.31.0.78:3389 Established
A. netstat B. arp C. ping D. tracert