____ attacks take place by guessing passwords and keys.

A. Session hijacking
B. Address spoofing
C. Denial-of-service (DoS)
D. Brute-force


Answer: D

Computer Science & Information Technology

You might also like to view...

The length of time it takes for a processor to request, locate, open and deliver information stored in RAM is measured in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A typeface is a set of characters based on a font using a specific size and style.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ element forces text to the next line

Fill in the blank(s) with correct word

Computer Science & Information Technology

Give a brief description of what it means to distribute objects.

What will be an ideal response?

Computer Science & Information Technology