1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
4 years ago
8

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d

ictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?a. brute force
b. hash replay
c. network replay
d. hybrid
Computers and Technology
2 answers:
Vlada [557]4 years ago
7 0

Answer:

d. hybrid  attack

Explanation:

Hybrid attack is basically the combination of dictionary attack and brute force attack and its names depicts that its a mixture of two attacks.

Dictionary attack is mechanism in which the password is cracked by trying as a password, every word in a dictionary in order to crack the password and enter a computer. As most of the and also the new users often use simple words as passwords which can also be found in a dictionary so breaking such passwords is easy using this technique.

Brute Force attack is basically making several attempts to crack a password. This technique of making multiple attempts and multiple combinations of passwords until the correct passwords is guess is called trial and error method.

Now hybrid attack is the combination of both brute force and dictionary attacks. So it uses a dictionary which provides a word list and then applies brute force on this word list which will modify dictionary words a little by adding brute force key space to the end of these words such as appending numbers, misspelling words or appending special characters. For example new employees less aware about the password attacks, kept their names as a password. So hybrid attack can be used by attacker/hacker to crack such passwords by obtaining a list of names of all new employees in the company. Then the attacker can apply a brute force attack to the end of each name to crack the password.

kipiarov [429]4 years ago
4 0

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

You might be interested in
Write a program that asks the user to enter a series of numbers separated by commas. Here is an example of valid input: 7,9,10,2
alex41 [277]

Answer:

Here is the JAVA program. Let me know if you need the program in some other programming language.

import java.util.Scanner; // used for taking input from user

public class Main{ //Main class

public static void main(String[] args) {//start of main() function body

  Scanner scan = new Scanner(System.in); // creates a Scanner type object

   String input; // stores input series

    int sum = 0; //stores the sum of the series

    System.out.println("Enter a series of numbers separated by commas: "); //prompts user to enter a series of numbers separated by comma

     input = scan.nextLine(); //reads entire input series

     String[] numbers = input.split("[, ]"); //breaks the input series based on delimiter i.e. comma and stores the split sub strings (numbers) into the numbers array

   for (int i = 0; i < numbers.length; i++) { //loops through each element of numbers array until the length of the numbers reaches

          sum += Integer.parseInt(numbers[i]); } // parses the each String element of numbers array as a signed decimal integer object and takes the sum of all the integer objects

     System.out.println("Sum of all the numbers: " + sum);  } } //displays the sum of all the numbers

Explanation:

The program prompts the user to enter a series separated by commas.

Then split() method is used to split or break the series of numbers which are in String form, into sub strings based on comma (,) . This means the series is split into separate numbers. These are stored in numbers[] array.

Next the for loop iterate through each sub string i.e. each number of the series, converts each String type decimal number to integer using Integer.parseInt and computes the sum of all these integers. The last print statement displays the sum of all numbers in series.  

If the input is 7,9,10,2,18,6

Then the output is: 7+9+10+2+18+6

sum = 52

The program and its output is attached.

8 0
3 years ago
Which type of sentence error, if any, is the above example? 
sammy [17]
I'm gonna say D. No sentence error
3 0
4 years ago
A team member who does not feel comfortable disagreeing with someones opinion in front of the team would most likely come from a
Sedbober [7]

Answer:

discussions and decisions made about public policy

Explanation:

7 0
2 years ago
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
3 years ago
In procedural programming, where does the flow of control usually route from the main function?
Zinaida [17]

Answer:

Subroutine or called function.

Explanation:

Procedural programming is a programming techniques of creating modular divisions between lines of code, with a provision to call and run a block of code at any given instance in the program.

A program flow control breaks at will from the main function to a target defined function or subroutine, which returns a value back to the normal flow of the program. It uses conditional and loop statement to achieve its task.

6 0
3 years ago
Other questions:
  • When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
    13·2 answers
  • A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
    10·1 answer
  • GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
    6·2 answers
  • Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can
    11·1 answer
  • Assume that PrecinctReport is a structured type with these fields, address (a string), and three int fields which are counts of
    9·1 answer
  • Explain the 2 types of network topology ​
    10·1 answer
  • 3.<br>What is the meaning of *.VBP.<br>​
    6·2 answers
  • .
    5·1 answer
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
  • A web site that contains large numbers of misspelled words and grammatical errors fails which of these general criteria?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!