This is when the attacker uses every possible combination of characters for the password.

What will be an ideal response?


brute force

Computer Science & Information Technology

You might also like to view...

Which key task in the policy development phase requires the authors to consult with internal and external experts, including legal counsel, human resources, compliance, cybersecurity and technology professionals, auditors, and regulators?

A) Writing B) Authorizing C) Vetting D) Planning

Computer Science & Information Technology

Pinterest is driving more traffic to company websites and blogs than YouTube, Facebook, and LinkedIn combined

Indicate whether the statement is true or false

Computer Science & Information Technology

It is permissible to download images from the Internet and re-use them as you see fit without regard to copyright or licensing requirements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The most common type of monitor for laptops and desktop computers is a(n) ________.

A. liquid crystal display (LCD) B. light-emitting diode (LED) C. organic light-emitting diode (OLED) D. cathode ray tube (CRT)

Computer Science & Information Technology