________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A. A hybrid dictionary attack
B. A combinatorial attack
C. A dictionary attack
D. Brute-force guessing


D. Brute-force guessing

Computer Science & Information Technology

You might also like to view...

Discuss the limits of DTDs, using examples.

What will be an ideal response?

Computer Science & Information Technology

The Animation gallery is displayed by clicking the ________ button on the Animations tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

When importing an Excel spreadsheet the column headings in Excel become the field names in Access

Indicate whether the statement is true or false

Computer Science & Information Technology

The code that identifies an index entry is:

a. EX b. IX c. XE

Computer Science & Information Technology