One password attack technique that is not used is online _______________ in which the attacker attempts to enter the password by typing different variations at the password login prompt.
Fill in the blank(s) with the appropriate word(s).
guessing
Computer Science & Information Technology
You might also like to view...
Joe needs to track employees who log into a confidential database and edit files. In the past, critical files have been edited, and no one admits to making the edits. Which of the following does Joe need to implement in order to enforce accountability?
A. Non-repudiation B. Fault tolerance C. Hashing D. Redundancy
Computer Science & Information Technology
The Save As command saves an existing workbook on a disk, using its current name and save location.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology