An attack in which a person try to crack passwords by using a combination of letters, numbers, and symbols again and again until successful.
What will be an ideal response?
brute force
Computer Science & Information Technology
You might also like to view...
Which port is the most common port used to connect input and output devices?
A) Parallel B) Universal serial bus (USB) C) FireWire D) Ethernet
Computer Science & Information Technology
The Math class provides the____ method that returns the integer to the right of the number on the number line.
A. Ceil(x) B. Ceiling(x) C. Int(x) D. Integer(x)
Computer Science & Information Technology