In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
A. dictionary
B. brute force
C. DoS
D. rogue AP
Answer: B
Computer Science & Information Technology
You might also like to view...
The RealAudio format was one of the first formats that allowed for streaming audio over low-to-high bandwidth connections.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Input a date MM DD YY from input stream
What will be an ideal response?
Computer Science & Information Technology
A ____ provides instructions on how to defend against malware software.
A. glossary B. key sheet C. definition D. briefing
Computer Science & Information Technology
Which of the following protocols allows email to be viewed while remaining on the email server?
A. SMTP B. SSL C. POP3 D. IMAP4
Computer Science & Information Technology