Describe a dictionary attack.
What will be an ideal response?
A dictionary attack begins with the attacker creating encrypted versions of common dictionary
words and then compares them against data captured through the wireless exchange of encrypted Kerberos information. If a match occurs between the encrypted dictionary word
and the wireless data, the password can be revealed.
You might also like to view...
What is the maximum cable length in a 100BaseT Ethernet network?
A) 10 meters B) 2 meters C) 100 meters D) 200 meters
The first step in planning and designing a PivotTable is to review your information to gain an understanding of the scope and structure.
Answer the following statement true (T) or false (F)
A variable comes into existence, or ____, when you declare it.
A. goes out of scope B. comes into scope C. overrides scope D. is referenced
When inserting a Flash movie into Dreamweaver, it is recommended that you copy all files to the ________ folder.
Fill in the blank(s) with the appropriate word(s).