On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A. one-fourth B. half

C. two-thirds D. three-fourths


B. half

Computer Science & Information Technology

You might also like to view...

Which of the following pairs demonstrates the has-a relationship between the first and the second terms?

a) car, vehicle b) house, window c) teacher, person d) None of the above

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2  In his database of thousands of records, Suresh wants to standardize the format of certain fields. However, he does not want to store the formatting characters (e.g., parentheses, dashes, and slash characters).  He decides to consult Sheila because she has extensive experience with input masks. Suresh wants to make letter entries optional in a license plate number field, as not all license plates have letters. What is the input mask character Sheila tells him to use?

A. L B. ? C. P D. !

Computer Science & Information Technology

As shown in the accompanying figure, the ____ bar is a toolbar that displays the Flash menu names.



a. Menu
b. Tools
c. Status
d. Application

Computer Science & Information Technology

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device.   What is the next step in the Bluetooth connection process?

A. Enter the pin code. B. Discover the device. C. Sign in to Bluetooth. D. Test the connection.

Computer Science & Information Technology