1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
2 years ago
9

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d

ictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
a. brute force
b. hash replay
c. network replay
d. hybrid
Computers and Technology
1 answer:
Galina-37 [17]2 years ago
6 0

Answer:

D) Hybrid Attack

Explanation:

This type of  attack is a blend of both a dictionary and brute force attack. The meaning of this is, while a dictionary attack method would capture a wordlist of passwords, the brute-force attack would be applied to each of  password captured.

You might be interested in
Zoe wants to post something controversial online, but then she remembers that employers may look at her social media when she st
allsm [11]

Answer:

D

Explanation:

7 0
2 years ago
FS and GS are two___________________ in protected mode.
masha68 [24]

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

7 0
2 years ago
BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
solmaris [256]

Answer:Peer-to-peer

Explanation: I hope this helps

5 0
2 years ago
Read 2 more answers
1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
Svetllana [295]

Answer:

I would say true.

5 0
2 years ago
Which of these statements about PNG is true?
Amiraneli [1.4K]

Answer:

d

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Rachel uses a word processor to write short stories. However, most of her time is spent toying with the keys, rather than in wri
    13·2 answers
  • When creating a professional presentation, how many typefaces are recommended at the most?
    5·1 answer
  • Which characteristic would be best for a person seeking a career in the Telecommunications pathway?
    15·1 answer
  • True/False: When you make a function call, the order of the arguments you send does not matter as long as the number of argument
    15·1 answer
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • What are logic gates ?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!