Solved

Match Each Item with a Statement Below

Question 11

Matching

Match each item with a statement below.

Premises:
Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Responses:
Snort
Intrusion detection
Dictionary attack
Brute force
Weak password

Correct Answer:

Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Related Questions