Which of the following is when a prearranged list of likely words is attempted one at a time?

A. Brute force attack
B. Dictionary attack
C. Cryptanalysis attack
D. Guessing

B. A dictionary attack uses a prearranged list of likely words, trying each one at a time.

Computer Science & Information Technology

You might also like to view...

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer

A) cluster B) root C) upper-level D) top-level

Computer Science & Information Technology

The concept of _____________ relates to providing a single resource that is configured for optimal display on multiple types of devices

a. hierarchical b. accessibility c. One Web d. fluid layout

Computer Science & Information Technology