Which of the following is when a prearranged list of likely words is attempted one at a time?
A. Brute force attack
B. Dictionary attack
C. Cryptanalysis attack
D. Guessing
B. A dictionary attack uses a prearranged list of likely words, trying each one at a time.
Computer Science & Information Technology
You might also like to view...
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer
A) cluster B) root C) upper-level D) top-level
Computer Science & Information Technology
The concept of _____________ relates to providing a single resource that is configured for optimal display on multiple types of devices
a. hierarchical b. accessibility c. One Web d. fluid layout
Computer Science & Information Technology