In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A. dictionary
B. brute force
C. DoS
D. rogue AP


Answer: B

Computer Science & Information Technology

You might also like to view...

The RealAudio format was one of the first formats that allowed for streaming audio over low-to-high bandwidth connections.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Input a date MM DD YY from input stream

What will be an ideal response?

Computer Science & Information Technology

A ____ provides instructions on how to defend against malware software.

A. glossary B. key sheet C. definition D. briefing

Computer Science & Information Technology

Which of the following protocols allows email to be viewed while remaining on the email server?

A. SMTP B. SSL C. POP3 D. IMAP4

Computer Science & Information Technology