Multiple Choice
In a ____ attack, after an attacker has access to a password file, he or she can run a password-cracking program that uses a dictionary of known words or passwords as an input file.
A) brute force
B) replay
C) ciphertext-only
D) dictionary
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q35: What is cryptanalysis?
Q48: A certificate contains a unique serial number
Q50: MATCHING<br>Match each term with the correct statement
Q51: _ is an asymmetrical algorithm that can
Q52: MATCHING<br>Match each term with the correct statement
Q53: _ attacks are used to find the
Q56: Cryptography is the process of converting plaintext,
Q57: How can confidentiality and authentication be achieved
Q57: MATCHING<br>Match each term with the correct statement
Q58: _ is a hashing algorithm developed by