Multiple Choice
In a ____ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time.
A) social engineering
B) brute force
C) dictionary
D) birthday
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q32: What are some of the tools used
Q33: Briefly explain how WEP implementation violates the
Q34: Wired equivalent privacy (WEP) is intended to
Q35: What are the main characteristics of Kerberos?
Q36: Wireless access control through MAC address filtering
Q37: What are the options for creating keys
Q38: A(n) _ acts as the central base
Q39: _ traffic is traffic destined for only
Q41: The APs can be positioned so that
Q42: A _ attack takes each word from