FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Your password is 1Vu*cI!8sT.Which attack method is your password vulnerable to?
A
Rainbow table
B
Brute force
C
Spidering
D
Dictionary
Explanation: 

Detailed explanation-1: -Brute-force attacks. A brute-force attack is when an attacker uses a system of trial and error in an attempt to guess valid user credentials. These attacks are typically automated using wordlists of usernames and passwords.

Detailed explanation-2: -What’s a Brute Force Attack? A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.

There is 1 question to complete.