Describe a dictionary attack.
What will be an ideal response?
The dictionary attack, which is a variation on the brute force attack, narrows the field by selecting specific target accounts and using a list of commonly used passwords (the dictionary) instead of random combinations. Organizations can use such dictionaries themselves to disallow passwords during the reset process and thus guard against easy to-guess passwords. In addition, rules requiring additional numbers and/or special characters make the dictionary attack less effective. Another variant, called a rainbow attack, makes use of a pre-computed hash using a time-memory tradeoff technique that uses a database of pre-computed hashes from sequentially calculated passwords to look up the hashed password and read out the text version, with no brute force required.
You might also like to view...
The regulatory and standards compliance competency has the required functional perspective of ____.
A. manage, design B. manage C. manage, design, evaluate D. manage, evaluate
Which statement is true regarding DIMM technologies?
A. DDR2 uses 184 pins B. DDR3 is backward compatible with DDR2 C. SDRAM runs synchronized with the system clock D. the S in SDRAM stands for static
The ____ control should be used to validate that a phone number was entered using the correct format.
A. RequiredFieldValidator B. RegularExpressionValidator C. RangeValidator D. CompareValidator
A system unit consists of the keyboard and the monitor.
Answer the following statement true (T) or false (F)