COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Your password is 1Vu*cI!8sT.Which attack method is your password vulnerable to?
|
Rainbow table
|
|
Brute force
|
|
Spidering
|
|
Dictionary
|
Explanation:
Detailed explanation-1: -Brute-force attacks. A brute-force attack is when an attacker uses a system of trial and error in an attempt to guess valid user credentials. These attacks are typically automated using wordlists of usernames and passwords.
Detailed explanation-2: -What’s a Brute Force Attack? A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.
There is 1 question to complete.