Which of the following is NOT an approach to password cracking?
A. ransomware
B. brute force
C. dictionary attacks
D. social engineering attacks
Answer: A
Computer Science & Information Technology
You might also like to view...
To allow a user to make changes to a cell after a worksheet is protected, you must ________ the cell
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
I have an algorithm that runs in O(N1/2), where n is the size of the problem. For N = 100, the time the algorithm runs is 1 minute. How long does the algorithm take for N=1000?
a) Same time b) About 3 minutes c) About 10 minutes d) About 30 minutes e) You haven’t given enough information. I can’t tell.
Computer Science & Information Technology