In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
A. dictionary
B. brute force
C. DoS
D. rogue AP
Answer: B
You might also like to view...
Which of the following is not a rule that must be followed when naming identifiers?
a. The first character must be one of the letters a-z, A-Z, and underscore or a dollar sign. b. Identifiers can contain spaces. c. Uppercase and lowercase characters are distinct. d. After the first character, you may use the letters a-z, A-Z, the underscore, a dollar sign, or digits 0-9.
Determine the growth function and order of the following code fragment:
What will be an ideal response?
Which Windows utility program removes redundancies from files in order to reduce file size?
A) Disk Cleanup B) Disk Defragmenter C) Program Manager D) File Compression
Which of the following settings is an example of a common Parental Control?
A) hours parents can log on B) what colors can be displayed on the monitor C) which programs can be run D) minimum age a child can log on