COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the password attacks listed below takes advantage of a predefined list of words?
A
Replay attack
B
Birthday attack
C
Brute-force attack
D
Dictionary attack
Explanation: 

Detailed explanation-1: -A dictionary attack uses a word list, which is a predefined list of words, each of which is hashed. If the cracking software matches the hash output from the dictionary attack to the password hash, the attacker has successfully identified the original password.

Detailed explanation-2: -Dictionary attack definition: “A type of brute force attack where an intruder attempts to crack a password-protected security system with a “dictionary list” of common words and phrases used by businesses and individuals.”

Detailed explanation-3: -A type of brute-force password attack, a dictionary attack is based on a list of commonly used words and phrases, as well as often-used passwords. To avoid having to crack a long list of possible passwords, attackers narrow down the list to what’s known as dictionary words.

Detailed explanation-4: -4. Which of the following comes under the advantage of dictionary attack? Explanation: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password. It is very fast, time-saving and easy to perform.

There is 1 question to complete.