This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. dictionary attack
B. password
C. firewall
D. encryption
Answer: A
Computer Science & Information Technology
You might also like to view...
In a worksheet, columns typically contain information that is similar to a list.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Design view allows you to see exactly how your report will look when printed. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What are the five different modes that can be used when modifying a disk image within VirtualBox?
What will be an ideal response?
Computer Science & Information Technology
In a master-detail relationship, the ______ block must be created first.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology