________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A. A hybrid dictionary attack
B. A combinatorial attack
C. Brute-force guessing
D. A dictionary attack


C. Brute-force guessing

Computer Science & Information Technology

You might also like to view...

What is the output of the following program?

``` #include using namespace std; class TestClass { private: int val; void showVal() { cout << val << endl; } public: TestClass(int x) { val = x; } }; int main() { TestClass test(77); test.showVal(); return 0; } ``` a. the program runs but there is no output. b. 77 c. 0 d. the program will not compile

Computer Science & Information Technology

Which of the following are the correct preprocessor commands necessary to prevent multiple inclusions of header files? If there is an answer here that works to prevent multiple inclusion, carefully describe how it works in the explanation.

a. #include “header.h” b. #define HEADER_H #ifndef HEADER_H //declarations for header.h go here #endif c. #ifndef HEADER_H #define HEADER_H // declarations for header.h go here #endif d. #ifndef HEADER_H //declarations for header.h go here #endif

Computer Science & Information Technology

As soon as you open a file in the Document window, the ____ bar appears in the lower-left corner of the window.

a. status b. options c. menu d. Tools

Computer Science & Information Technology

The process of modifying a presentation by adding and deleting slides or by changing the contents of individual slides is referred to as:

a. Editing b. Formatting c. Aligning

Computer Science & Information Technology