1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
2 years ago
11

Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us

er. Which of the password cracking technique will the attacker use if he/she obtains some information about the password to crack?
Computers and Technology
1 answer:
Vlada [557]2 years ago
5 0

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

You might be interested in
By Carl Sandburg
Eva8 [605]
The answer is 1 because the poet uses personification.
6 0
2 years ago
5. Why do we need programming language?​
Natasha_Volkova [10]

Answer:

hajshshzjsjwb

Explanation:

bsbjsjsjwjwjs

3 0
3 years ago
Read 2 more answers
Why did the i have a dream speech happen
lions [1.4K]
Because he wanted equal rights for everyone
7 0
3 years ago
N, or central processing unit, is also known as the
Rzqust [24]
CPU is the Answer to this question.
6 0
3 years ago
Read 2 more answers
ALSO PLZZZ HELP :P Suppose you are purchasing a game at a local retail store that comes on DVD. In order to install it on your l
zheka24 [161]
I think the answer is B: an optical drive
Hope this helps have a great night
8 0
3 years ago
Other questions:
  • WILL DO A BRAINLY! help pls.
    15·1 answer
  • Jeremy’s office is in an earthquake prone area. His web server is in his office. What step should he take to protect the data on
    5·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Why does my hp computer keep freezing when i move it?
    10·1 answer
  • What is an Apple Pen?
    5·2 answers
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    14·1 answer
  • Question #4
    10·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • True or false you can add audio from flies on your own pc or record your own audio
    12·2 answers
  • Which statement correctly differentiates how to use list and table styles?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!