Describe a dictionary attack.
What will be an ideal response?
A dictionary attack begins with the attacker creating encrypted versions of common dictionary
words and then compares them against data captured through the wireless exchange of encrypted Kerberos information. If a match occurs between the encrypted dictionary word
and the wireless data, the password can be revealed.
Computer Science & Information Technology
You might also like to view...
How many times would the following loop iterate?
``` Set k = 1 Do Display k Set k = k + 1 Until k > 2 ``` a. 1 b. 2 c. 3 d. infinite
Computer Science & Information Technology
In the graph in the accompanying figure, the values of ____________________ tones are the values of the tones after images are made.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology