An attack in which a person try to crack passwords by using a combination of letters, numbers, and symbols again and again until successful.

What will be an ideal response?

brute force

Computer Science & Information Technology

You might also like to view...

Which port is the most common port used to connect input and output devices?

A) Parallel B) Universal serial bus (USB) C) FireWire D) Ethernet

Computer Science & Information Technology

The Math class provides the____ method that returns the integer to the right of the number on the number line.

A. Ceil(x) B. Ceiling(x) C. Int(x) D. Integer(x)

Computer Science & Information Technology