Multiple Choice
A ____ attack exhausts all possible keys to decrypt a password.
A) Trojan horse
B) keylogger
C) dictionary
D) brute force
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q52: A(n) _ device works with continuous data.<br>A)
Q53: Case 3 Sometimes it is hard to
Q54: Critical Thinking questions (Multiple Choice) You have
Q55: Which of the following is NOT an
Q56: A(n) _ system is essentially the master
Q58: Although you might be asked to provide
Q59: _ is the illegal copying and distribution
Q60: Identify the letter of the choice that
Q61: The _ is a collection of linked
Q62: _ are significant because they are the