____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A. Brute force
B. Dictionary attack
C. Meet-in-the-middle
D. Man-in-the-middle

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about companies monitoring employees?

a. Companies are prohibited, by law, to monitor their employees computer use. b. When entering a secured area that requires authorized access, be aware of anyone who is attempting to tailgate. c. Employees who access pornographic Web sites or circulate offensive jokes via e-mail may be creating a hostile environment for other employees. d. Companies are concerned about employees who may offer trade secrets to competitors in hopes of landing an attractive job offer.

Computer Science & Information Technology

If you wish to create a postcard you must choose the template from the ________ options dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology