FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Passwords that contain recognizable words are vulnerable to a:
A
Denial of Service attack
B
Hashing attack
C
Dictionary attack
D
James attack
Explanation: 

Detailed explanation-1: -Dictionary attacks attempt a collection of predefined weak passwords, such as 0000, 1234, admin, password, etc.

Detailed explanation-2: -Dictionary attack definition: “A type of brute force attack where an intruder attempts to crack a password-protected security system with a “dictionary list” of common words and phrases used by businesses and individuals.”

Detailed explanation-3: -Examples of Dictionary Attacks A website fails to ensure that its password length and complexity requirements are secure enough. As a result, some users select extremely easy to guess passwords–like “abc123” or “987654, ” the first passwords often tried in a dictionary attack.

Detailed explanation-4: -A dictionary attack uses a preselected library of words and phrases to guess possible passwords. It operates under the assumption that users tend to pull from a basic list of passwords, such as “password, ” “123abc” and “123456.” These lists include predictable patterns that can vary by region.

There is 1 question to complete.