A __________ is a password guessing program.

A. password hash B. password cracker

C. password biometric D. password salt


B. password cracker

Computer Science & Information Technology

You might also like to view...

You cannot create an object using a/an:

(a) superclass constructor (b) subclass constructor (c) ancestor class constructor (d) abstract class constructor

Computer Science & Information Technology

To uncompress a file compressed with the gzip utility, you use the ____ command.

A. gunzip B. unzip C. bunzip D. gunzip2

Computer Science & Information Technology

The ________ works within the network to determine where data from another network should go

A) packet B) wireless router C) router D) switch

Computer Science & Information Technology

You can correct the appearance of a shape tween using shape ____.

A. patterns B. hints C. clicks D. tags

Computer Science & Information Technology