Describe a dictionary attack.

What will be an ideal response?

A dictionary attack begins with the attacker creating encrypted versions of common dictionary
words and then compares them against data captured through the wireless exchange of encrypted Kerberos information. If a match occurs between the encrypted dictionary word
and the wireless data, the password can be revealed.

Computer Science & Information Technology

You might also like to view...

How many times would the following loop iterate?

``` Set k = 1 Do Display k Set k = k + 1 Until k > 2 ``` a. 1 b. 2 c. 3 d. infinite

Computer Science & Information Technology

In the graph in the accompanying figure, the values of ____________________ tones are the values of the tones after images are made.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology