Multiple Choice
A ____ attack uses a list of common values to crack a password.
A) dictionary
B) distributed denial-of-service (DDoS)
C) brute force
D) man-in-the-middle
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q88: Information security governance consists of the leadership,organizational
Q89: A clearly directed strategy flows from top
Q90: A good general governance framework based on
Q91: The Carnegie Mellon University _ information security
Q92: In a(n)_ attack,the attacker uses an e-mail
Q94: The CISO is also known as
Q95: _ are responsible for the security and
Q96: A _ is a feature left behind
Q97: _ controls set the direction and scope
Q98: Penetration testing is often conducted by consultants