What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?

A. man in the middle
B. brute force
C. dictionary
D. hash

Answer: C

Computer Science & Information Technology

You might also like to view...

What do the language options allow you to change?

What will be an ideal response?

Computer Science & Information Technology

Which of the following applications can be used to create XML documents?

A) Photoshop B) Illustrator C) Notepad D) iPhoto

Computer Science & Information Technology