When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?
A. brute force
B. replay
C. ciphertext-only
D. dictionary
Answer: D
Computer Science & Information Technology
You might also like to view...
Satellite dishes in the United States have to face the ________ sky to send and receive signals
Fill in the blank(s) with correct word
Computer Science & Information Technology
When an Append query is run on a table that has no primary key, where do the new records appear?
A) Alphabetically in ascending order mixed in with the current list B) You cannot run an Append query on a table with no primary key C) Top of the table D) Bottom of the table
Computer Science & Information Technology