A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files.

Fill in the blank(s) with the appropriate word(s).


dictionary attack

Computer Science & Information Technology

You might also like to view...

What is the principle of least privilege?

What will be an ideal response?

Computer Science & Information Technology

What happens if the sending NIC does not know the MAC address of the NIC that is to receive data?

What will be an ideal response?

Computer Science & Information Technology

Before publishing a form on the Internet or a company intranet, a systems analyst should protect it so users can change the layout or design but cannot fill it in.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You must specify a ___________________________ data type in the procedure declaration to define the type of variable that is being returned to the calling procedures by the Function procedure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology