Match each item with a statement below.
A. Examines network traffic for known attack signatures
B. Composed of information commonly known about the individual
C. Uses a list of common passwords to try to crack an unknown password
D. Typically the most time consuming way to crack a password
E. The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
A. Snort
B. Weak password
C. Dictionary attack
D. Brute force
E. Intrusion detection
You might also like to view...
A(n) ________ key that is created from naturally occurring data generated outside of a database such as a driver's license number
Fill in the blank(s) with correct word
You can use the drag-and-drop method to move a slide to a new location.
Answer the following statement true (T) or false (F)