an attack that can be used to crack a long password by trying words and word combinations

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


dictionary attack

Computer Science & Information Technology

You might also like to view...

When you extrude an object, which of the following is NOT an axis across which you can rotate the object?

A. A-axis B. X-axis C. Y-axis D. Z-axis

Computer Science & Information Technology

A(n) ________ macro is a database object that you create and use independently of other controls or objects

Fill in the blank(s) with correct word

Computer Science & Information Technology

In administering a survey where respondents answer "Yes" or "No" to a specific question, ordinal variables could be used to categorize the responses, such as 1 = Yes and 2 = No

Indicate whether the statement is true or false.

Computer Science & Information Technology

Choosing to merge only records with the ZIP Code 39440-1203 is called ____ records.

A. arranging B. filtering C. merging D. sorting

Computer Science & Information Technology