In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A. dictionary
B. brute force
C. DoS
D. rogue AP


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is not a rule that must be followed when naming identifiers?

a. The first character must be one of the letters a-z, A-Z, and underscore or a dollar sign. b. Identifiers can contain spaces. c. Uppercase and lowercase characters are distinct. d. After the first character, you may use the letters a-z, A-Z, the underscore, a dollar sign, or digits 0-9.

Computer Science & Information Technology

Determine the growth function and order of the following code fragment:

What will be an ideal response?

Computer Science & Information Technology

Which Windows utility program removes redundancies from files in order to reduce file size?

A) Disk Cleanup B) Disk Defragmenter C) Program Manager D) File Compression

Computer Science & Information Technology

Which of the following settings is an example of a common Parental Control?

A) hours parents can log on B) what colors can be displayed on the monitor C) which programs can be run D) minimum age a child can log on

Computer Science & Information Technology