What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?

A. man in the middle
B. brute force
C. dictionary
D. hash


Answer: C

Computer Science & Information Technology

You might also like to view...

How many colors are used in the RGB system?

A) 2 B) 3 C) 16 D) 255

Computer Science & Information Technology

The ________ function finds the value that is mathematically the smallest

Fill in the blank(s) with correct word

Computer Science & Information Technology

When a heading is ________, all the sublevels and text associated with the level are hidden

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can add alternate text to an image map in the ____ dialog box.

A. Image Maps B. Alternate Properties C. Accessibility Properties D. Pictures

Computer Science & Information Technology