Multiple Choice
A user picks the password tiger.This is likely to be cracked most quickly by a(n) ________.
A) attack on an application running as root
B) brute-force attack
C) dictionary attack
D) authentication attack
Correct Answer:

Verified
Correct Answer:
Verified
Q62: Which is less expensive to implement?<br>A) SSL/TLS<br>B)
Q85: Which of the following can be a
Q86: Credit card number thieves are called _.(Pick
Q87: Scripts are normally bad.
Q88: Which of the following must be followed?<br>A)Standards.<br>B)Guidelines.<br>C)Both
Q89: Hacking is defined as intentionally using a
Q91: In authentication,the _ is the party trying
Q93: In symmetric key encryption,a key must be
Q94: Oversight activities include _.<br>A)vulnerability testing<br>B)creating guidelines<br>C)Both A
Q95: Implementation guidance is less specific than implementation.