Multiple Choice
A ____ attack uses password-cracking software.
A) brute force
B) sniffing
C) phishing
D) cracker
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q105: An electronic component that can be programmed
Q106: At one time, <u>minicomputers</u> were smaller,less expensive,and
Q107: MATCHING<br>Identify the letter of the choice that
Q108: An area where data can be left
Q109: A term that refers to the gap
Q111: Data becomes _ when it is presented
Q112: Initially sales were slow for the personal
Q113: The _ phase of the digital revolution
Q114: A(n) <u>account</u> manager stores user IDs with
Q115: The expectation that a person's information will