1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
8

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d

ictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?a. brute force
b. hash replay
c. network replay
d. hybrid
Computers and Technology
2 answers:
Vlada [557]3 years ago
7 0

Answer:

d. hybrid  attack

Explanation:

Hybrid attack is basically the combination of dictionary attack and brute force attack and its names depicts that its a mixture of two attacks.

Dictionary attack is mechanism in which the password is cracked by trying as a password, every word in a dictionary in order to crack the password and enter a computer. As most of the and also the new users often use simple words as passwords which can also be found in a dictionary so breaking such passwords is easy using this technique.

Brute Force attack is basically making several attempts to crack a password. This technique of making multiple attempts and multiple combinations of passwords until the correct passwords is guess is called trial and error method.

Now hybrid attack is the combination of both brute force and dictionary attacks. So it uses a dictionary which provides a word list and then applies brute force on this word list which will modify dictionary words a little by adding brute force key space to the end of these words such as appending numbers, misspelling words or appending special characters. For example new employees less aware about the password attacks, kept their names as a password. So hybrid attack can be used by attacker/hacker to crack such passwords by obtaining a list of names of all new employees in the company. Then the attacker can apply a brute force attack to the end of each name to crack the password.

kipiarov [429]3 years ago
4 0

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

You might be interested in
Which of the following contains fair use?
Reptile [31]
The answer to your question is D
8 0
3 years ago
The location on the Word screen where text will be entered is known as the _____.
mixas84 [53]
Insertion point is represented by blinking vertical line
4 0
3 years ago
A user has just clicked the OK button on a Web form. Which technology is often used to process information sent from the form?
Taya2010 [7]
Still cant tell which is which
7 0
3 years ago
E whether True or False.
Natasha_Volkova [10]

Answer:

Learn vocabulary, terms, and more with flashcards, games, and other study ... covers a large geographical area and is made up of many smaller networks. ... you share the cable infrastructure with your neighbors ... do you need if you want to connect two network segments together such as a ... the twists reduce crosstalk.Explanation:

5 0
3 years ago
Whats the name of the windows 10 nucleus
stepan [7]

Answer:

motheboard

Explanation:

7 0
3 years ago
Other questions:
  • At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon
    13·2 answers
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
    13·1 answer
  • What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
    11·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • A business that helps people find jobs for a fee
    12·1 answer
  • What are the characteristics of Instant Search in Outlook 2016? Check all that apply. A)Typing whole phrases makes your search m
    12·1 answer
  • What is technology?5points​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!