1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
2 years ago
14

Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a

password that is a word or a name
Computers and Technology
1 answer:
vova2212 [387]2 years ago
3 0

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

You might be interested in
What is the penalty for violating section 1201 of title 17 chapter 21 of the us code
svlad2 [7]

Prison or juvenile detention of course, its a violation

4 0
3 years ago
What does "CPU" stand for?
MrMuchimi
Central processing unit
7 0
3 years ago
Read 2 more answers
What are the four conditions to help determine whether a website is a good source for information?
Ratling [72]

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

3 0
2 years ago
What is a office buttom?
SpyIntel [72]
The Microsoft button was exclusively used in the 2007 versions of word, excel, powerpoint, access and outlook. It has all of the different options like to save, print, open ect. It was located in the top left hand corner of the screen. It looked a bit like this (see attachment).

3 0
3 years ago
What is typically unique in each database table?
andriy [413]

ID number APEX  answer

4 0
3 years ago
Read 2 more answers
Other questions:
  • Who is responsible for customer service?
    14·1 answer
  • What's the difference between intranet and extranet ​
    9·1 answer
  • Use fuel with the _____________ rating recommended by your vehicle manufacturer. A ) Converter B) Emission C) Exhaust D) Octane
    9·2 answers
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • Which of these is NOT a mathematical operator used in Python?
    12·1 answer
  • The scientific process is most similar to what
    10·1 answer
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • Uh can somebody help me
    6·1 answer
  • Use the function varimp() on the output of train() and save it to an object called imp:_____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!