Multiple Choice
A ____ attack occurs when a cracker uses a program to enter character combinations until the system accepts a user name and password.
A) phishing
B) man-in-the-middle
C) brute force
D) none of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q21: Heather's friend recently had her identity stolen
Q22: The combination of user login plus password
Q23: A digital ID is purchased from _.<br>A)
Q24: The latest, most secure form of SSL
Q25: The use of nonphysical security techniques to
Q27: MATCHING<br>-verifying the identity of a person<br>A)spoofing<br>B)adware<br>C)steganography<br>D)spyware<br>E)port scan<br>F)port<br>G)hacker<br>H)necessity<br>I)authentication<br>J)secrecy<br>K)secret
Q28: MATCHING<br>-a component of asymmetric encryption<br>A)spoofing<br>B)adware<br>C)steganography<br>D)spyware<br>E)port scan<br>F)port<br>G)hacker<br>H)necessity<br>I)authentication<br>J)secrecy<br>K)secret key<br>L)password
Q29: You can purchase a digital signature from
Q30: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TB5447/.jpg" alt=" -Figure 6-2 shows
Q31: A(n) _ attack involves phony email messages