Multiple Choice
____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.
A) Brute-force
B) Dictionary
C) Profile
D) Statistics
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q32: In civil and criminal cases, the scope
Q33: The data-hiding technique _ changes data from
Q34: What are the file systems supported by
Q35: What are the basic guidelines to identify
Q36: FTK cannot perform forensics analysis on FAT12
Q38: Match each item with a statement below:<br>-an
Q39: _ is a remote access program for
Q40: AccessData _ compares known file hash values
Q41: _ search catalogs all words on the
Q42: FTK cannot analyze data from image files