Which of the following is NOT an approach to password cracking?

A. ransomware
B. brute force
C. dictionary attacks
D. social engineering attacks

Answer: A

Computer Science & Information Technology

You might also like to view...

To allow a user to make changes to a cell after a worksheet is protected, you must ________ the cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

I have an algorithm that runs in O(N1/2), where n is the size of the problem. For N = 100, the time the algorithm runs is 1 minute. How long does the algorithm take for N=1000?

a) Same time b) About 3 minutes c) About 10 minutes d) About 30 minutes e) You haven’t given enough information. I can’t tell.

Computer Science & Information Technology