Which type of attack uses a list of common passwords?
a. Brute force attack
b. Spoofing attack
c. Dictionary attack
d. Smurf attack
Answer: c. Dictionary attack
You might also like to view...
To convert a report to a Web page, open the report, then click the ____ DATA tab.
A. EXPORT B. IMPORT C. EXTERNAL D. INERNAL
You can use the ____ command to gather information about a specific VLAN (instead of listing all VLANs).
A. cfg vlan [#] -status B. show vlan [#] C. sw vlan [#] D. vlan member [#]
The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?
A. Data integrity measurement B. Network traffic analysis C. Risk acceptance process D. Continuous monitoring
Time management tools in a help desk software package probably have the greatest impact on the productivity of ____.
A. a help desk manager B. a help desk agent C. a help desk client D. any of these