Multiple Choice
A user picks the password tiger.This is likely to be cracked most quickly by a(n) ________.
A) attack on an application running as root
B) brute-force attack
C) dictionary attack
D) hybrid dictionary attack
Correct Answer:

Verified
Correct Answer:
Verified
Q6: Which of the following must be followed?<br>A)standards<br>B)guidelines<br>C)both
Q16: Authentication should generally be _.<br>A)as strong as
Q72: A firewall will drop a packet if
Q90: A specific encryption method is called a
Q134: In digital certificate authentication,the verifier uses _.<br>A)the
Q136: Static packet filtering _.<br>A)only looks at a
Q138: Which of the following can thwart directly-propagating
Q142: The threat environment includes _.<br>A)attackers<br>B)attacks<br>C)both A and
Q143: Actions that people are allowed to take
Q144: Passwords are widely used because they can