What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
A. man in the middle
B. brute force
C. dictionary
D. hash
Answer: C
Computer Science & Information Technology