Describe a dictionary attack.

What will be an ideal response?


The dictionary attack, which is a variation on the brute force attack, narrows the field by selecting specific target accounts and using a list of commonly used passwords (the dictionary) instead of random combinations. Organizations can use such dictionaries themselves to disallow passwords  during the reset process and thus guard against easy to-guess passwords. In addition, rules requiring additional numbers and/or special characters make the dictionary attack less effective. Another variant, called a rainbow attack, makes use of a pre-computed hash using a time-memory tradeoff technique that uses a database of pre-computed hashes from sequentially calculated passwords to look up the hashed password and read out the text version, with no brute force required.

Computer Science & Information Technology

You might also like to view...

The regulatory and standards compliance competency has the required functional perspective of ____.

A. manage, design B. manage C. manage, design, evaluate D. manage, evaluate

Computer Science & Information Technology

Which statement is true regarding DIMM technologies?

A. DDR2 uses 184 pins B. DDR3 is backward compatible with DDR2 C. SDRAM runs synchronized with the system clock D. the S in SDRAM stands for static

Computer Science & Information Technology

The ____ control should be used to validate that a phone number was entered using the correct format.

A. RequiredFieldValidator B. RegularExpressionValidator C. RangeValidator D. CompareValidator

Computer Science & Information Technology

A system unit consists of the keyboard and the monitor.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology