Which of the following is when a prearranged list of likely words is attempted one at a time?

A. Brute force attack
B. Dictionary attack
C. Cryptanalysis attack
D. Guessing


B. A dictionary attack uses a prearranged list of likely words, trying each one at a time.

Computer Science & Information Technology

You might also like to view...

The ________ multithreading header contains classes, a function and an enum that are used together with facilities in header to implement thread synchronization. In particular, condition variables can be used to make threads wait for a specific condition in a program, then to notify the waiting threads when that condition is satisfied.

a. b. c. d.

Computer Science & Information Technology

A ____ defines the size of the page and its elements as a percentage of the screen width, meaning that a Web page and its elements are wider on a wider screen.

A. fixed layout B. standard layout C. fluid layout D. water layout

Computer Science & Information Technology

Compressed files often have which of the following file extensions?

A) .exe B) .bmp C) .zip D) .tif

Computer Science & Information Technology

You can double-click an interactive button to open the Button Properties dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology