Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?
A. Entropy
B. Massive
C. Dictionary
D. Brute force
Answer: D
You might also like to view...
Answer the following statements true (T) or false (F)
1) A program must call function close explicitly to close a file associated with an ifstream, ofstream or fstream object. 2) If the file-position pointer points to a location in a sequential file other than the beginning of the file, the file must be closed and reopened to read from the beginning of the file. 3) The ostream member function write can write to standard-output stream cout. 4) Data in sequential files always is updated without overwriting nearby data. 5) Searching all records in a random-access file to find a specific record is unnecessary.
Why might you want to write a program in a machine-independent language instead of a machine-dependent language? Why might a machine-dependent language be more appropriate for writing certain types of programs?
What will be an ideal response?
The ____________________ table is a spreadsheet-like display of project information, organized in rows and columns.
Fill in the blank(s) with the appropriate word(s).
Each time you tap the TAB key, a nonprinting tab formatting mark is inserted to reposition the insertion point.
Answer the following statement true (T) or false (F)