Which of the following attack types can be prevented by requiring letters and numbers in password?

A. brute force attacks
B. dictionary attacks
C. smurf attacks
D. rainbow attacks


B
Explanation : A dictionary attack occurs when attackers use a dictionary of common words to discover passwords. An automated program uses the hash of the dictionary word and compares this hash value to entries in the system password file. You should implement a security rule that says that a password must NOT be a word found in the dictionary to protect against these attacks. Inserting numbers and other characters can also thwart these attacks.

Computer Science & Information Technology

You might also like to view...

Recursion often is preferable to iteration because ________.

a. it is faster. b. it requires less memory. c. it models the problem more logically. d. All of the above.

Computer Science & Information Technology

________ macros can be executed directly from the Navigation Pane by double-clicking the macro object, clicking Run in Design view, or by attaching the macro to a database object, like a button or text field

Fill in the blank(s) with correct word

Computer Science & Information Technology

Unicode can be used as collating sequences for character string values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with the correct statement below.

A. The Ribbon component that contains a number of related commands. B. C. Shows where keyed text will appear. D. This command enlarges the window to its fullest size. E. Contains the commands used to create documents and format text and paragraphs. F. Used to find an appropriate word to substitute for another word. G. Provides a means of navigating through a document efficiently. H. I. Provides a preview of the document and options for printing. J. Displays nonprinting characters such as paragraph markers and spaces. K. Used to reverse the most recent action you have changed. L. M. Displays options for opening documents, creating new documents, and managing files. N. Provides a way to copy the format of one paragraph to another. O. Contains icons for frequently used commands such as Save, Undo, and Redo. P. The feature that automatically moves text to the next line when one line is full. Q. Feature on the status bar that is used to zoom in and out to view a document in a larger or smaller size. R. S. Appears when text is selected and contains frequently used formatting commands.

Computer Science & Information Technology