Which type of attack uses a list of common passwords?

a. Brute force attack
b. Spoofing attack
c. Dictionary attack
d. Smurf attack


Answer: c. Dictionary attack

Computer Science & Information Technology

You might also like to view...

To convert a report to a Web page, open the report, then click the ____ DATA tab.

A. EXPORT B. IMPORT C. EXTERNAL D. INERNAL

Computer Science & Information Technology

You can use the ____ command to gather information about a specific VLAN (instead of listing all VLANs).

A. cfg vlan [#] -status B. show vlan [#] C. sw vlan [#] D. vlan member [#]

Computer Science & Information Technology

The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?

A. Data integrity measurement B. Network traffic analysis C. Risk acceptance process D. Continuous monitoring

Computer Science & Information Technology

Time management tools in a help desk software package probably have the greatest impact on the productivity of  ____.

A. a help desk manager B. a help desk agent C. a help desk client D. any of these

Computer Science & Information Technology