________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A. A hybrid dictionary attack
B.A combinatorial attack
C. A dictionary attack
D. Brute-force guessing


D. Brute-force guessing

Computer Science & Information Technology

You might also like to view...

Instead of logging performance counters to disk, you can configure which of the following to occur?

A. messages B. alerts C. tasks D. archives

Computer Science & Information Technology

Small-screen devices, such as tablets, e-readers, and smartphones, use mobile browsers

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use contact information from People in other apps, including ____.

A. Weather B. News C. Sports D. Mail

Computer Science & Information Technology

A data warehouse may be updated by a legacy system.

a. true b. false

Computer Science & Information Technology