This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. dictionary attack
B. password
C. firewall
D. encryption


Answer: A

Computer Science & Information Technology

You might also like to view...

In a worksheet, columns typically contain information that is similar to a list.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Design view allows you to see exactly how your report will look when printed. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the five different modes that can be used when modifying a disk image within VirtualBox?

What will be an ideal response?

Computer Science & Information Technology

In a master-detail relationship, the ______ block must be created first.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology