________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.
A. A hybrid dictionary attack
B. A combinatorial attack
C. Brute-force guessing
D. A dictionary attack
C. Brute-force guessing
Computer Science & Information Technology
You might also like to view...
Which of the following devices uses one or more pens to draw an image on a roll of paper?
A) Stylus B) Thermal printer C) Plotter D) Dye-sublimation printer
Computer Science & Information Technology
When combined with conditional logic, loops provide the basis for developing the programming logic needed to process and validate user input.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology