____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.
A. Brute force
B. Dictionary attack
C. Meet-in-the-middle
D. Man-in-the-middle
Answer: A
You might also like to view...
Which of the following is not true about companies monitoring employees?
a. Companies are prohibited, by law, to monitor their employees computer use. b. When entering a secured area that requires authorized access, be aware of anyone who is attempting to tailgate. c. Employees who access pornographic Web sites or circulate offensive jokes via e-mail may be creating a hostile environment for other employees. d. Companies are concerned about employees who may offer trade secrets to competitors in hopes of landing an attractive job offer.
If you wish to create a postcard you must choose the template from the ________ options dialog box
Fill in the blank(s) with correct word