Match each item with a statement below.

A. Examines network traffic for known attack signatures
B. Composed of information commonly known about the individual
C. Uses a list of common passwords to try to crack an unknown password
D. Typically the most time consuming way to crack a password
E. The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature

A. Snort
B. Weak password
C. Dictionary attack
D. Brute force
E. Intrusion detection

Computer Science & Information Technology

You might also like to view...

A(n) ________ key that is created from naturally occurring data generated outside of a database such as a driver's license number

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can use the drag-and-drop method to move a slide to a new location.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology