1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
9

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d

ictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
a. brute force
b. hash replay
c. network replay
d. hybrid
Computers and Technology
1 answer:
Galina-37 [17]3 years ago
6 0

Answer:

D) Hybrid Attack

Explanation:

This type of  attack is a blend of both a dictionary and brute force attack. The meaning of this is, while a dictionary attack method would capture a wordlist of passwords, the brute-force attack would be applied to each of  password captured.

You might be interested in
Which of the following is NOT a font style?<br> Italic<br> Bold<br> Regular<br> Iconic
madam [21]

Answer:

iconic

Explanation:

iconic iconic iconic

8 0
3 years ago
Read 2 more answers
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
Ben wants to create a Book class that has an instance variable serialNumber. Where should he declare the instance variable
MrMuchimi

Answer:

within the Book class but needs to also be outside of any methods.

Explanation:

If Ben is creating an entire Book class then the instance variable needs to be within the Book class but needs to also be outside of any methods. If Ben places the variable inside a method it can only be used by that method and therefore becomes an instance variable of that method and not the class. By creating it inside the class and outside the methods it can be used every single time a Book object is created. Therefore, creating an instance variable of serialNumber every time.

4 0
3 years ago
A user has connected an external monitor to a laptop vga port. what is the next step the user should take?
svetoff [14.1K]

The next step that the user should take after connecting an external monitor to a laptop VGA port is to take advantage of the FN key by using it, together with the multi-purpose key in which is helpful in sending video for an external display.

3 0
3 years ago
What is piracy? (1 point)
QveST [7]

Answer:

B

Explanation:

4 0
2 years ago
Other questions:
  • Write a program that accepts as input the mass, in grams, and density, in grams per cubic centimeters, and outputs the volume of
    14·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • The entire presentation can be seen at a time in __________
    5·1 answer
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • Select the correct answer.
    10·1 answer
  • Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
    7·1 answer
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
    13·1 answer
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
  • Suppose the cache access time is 10ns, main memory access time is 200ns, and the cache hit rate is 90%. Assuming parallel (overl
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!