an attack that can be used to crack a long password by trying words and word combinations
adware
digital certificate
grayware
keylogger
dictionary attack
social engineering
tailgating
Trojan
zombie
worm
dictionary attack
You might also like to view...
When you extrude an object, which of the following is NOT an axis across which you can rotate the object?
A. A-axis B. X-axis C. Y-axis D. Z-axis
A(n) ________ macro is a database object that you create and use independently of other controls or objects
Fill in the blank(s) with correct word
In administering a survey where respondents answer "Yes" or "No" to a specific question, ordinal variables could be used to categorize the responses, such as 1 = Yes and 2 = No
Indicate whether the statement is true or false.
Choosing to merge only records with the ZIP Code 39440-1203 is called ____ records.
A. arranging B. filtering C. merging D. sorting