What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
A. man in the middle
B. brute force
C. dictionary
D. hash
Answer: C
Computer Science & Information Technology
You might also like to view...
How many colors are used in the RGB system?
A) 2 B) 3 C) 16 D) 255
Computer Science & Information Technology
The ________ function finds the value that is mathematically the smallest
Fill in the blank(s) with correct word
Computer Science & Information Technology
When a heading is ________, all the sublevels and text associated with the level are hidden
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can add alternate text to an image map in the ____ dialog box.
A. Image Maps B. Alternate Properties C. Accessibility Properties D. Pictures
Computer Science & Information Technology