The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?

A. Rainbow tables attacks
B. Brute force attacks
C. Birthday attacks
D. Cognitive passwords attacks

Answer: D. Cognitive passwords attacks

Computer Science & Information Technology

You might also like to view...

To be able to manipulate ________, you must allow users to Edit Objects, which allows changes to the PivotCharts

A) unnecessary objects B) hidden objects C) slicers D) sparklines

Computer Science & Information Technology

Coding schemes map a set of ____________________ characters (letters and numbers) and special symbols to a sequence of numeric values that a computer can process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology