A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files.

Fill in the blank(s) with the appropriate word(s).

dictionary attack

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings?

I. Optical character recognition (OCR) II. Scan Image III. Attach File IV. Audio Clip V. Video Clip A. Using a scanner to insert an image on your page B. To record this you need a computer-compatible microphone or a headset with a microphone C. Inserting a file into a notebook D. Software that converts images to text E. To record this you need a webcam on your computer or tablet

Computer Science & Information Technology

A tool in Word that controls how words are split between two lines is:

A) Hyphenation. B) Justification. C) Line Spacing. D) Word Wrap.

Computer Science & Information Technology