Multiple Choice
Which attack is used when a copy of the hash of the user's password has been obtained?
A) Rainbow attack
B) Brute force attack
C) Dictionary attack
D) Spoofing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q33: Describe the issue-specific security policy (ISSP) and
Q34: Which term identifies a single instance of
Q36: Match each item with a statement below.<br>a.Accuracy<br>f.Data
Q37: Which resource is a physical asset?<br>A) Web
Q39: Discuss the layered implementation of security.
Q40: The McCumber Cube provides a _ description
Q41: One of the basic tenets of security
Q42: A(n) _ defines the boundary between the
Q43: A(n) _ is a program or device
Q75: _ is the protection of information and