Multiple Choice
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
A) strong arm
B) permuted
C) brute-force
D) zero-day
E) infinity
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: Which of these would be an example
Q8: A protester seeking to make a political
Q9: The term _ originally referred to a
Q10: Describe briefly a few of the physical
Q11: According to research firm Gartner, the majority
Q13: Because of Moore's Law, widely-used encryption programs
Q14: What are the steps to be taken
Q15: In security circles the phrase "compliance" refers
Q16: Describe briefly how technology can be leveraged
Q17: Which of the following is a valid