Solved

Match Each Item with a Statement Below

Question 22

Matching

Match each item with a statement below.

Premises:
Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Responses:
Snort
Intrusion detection
Dictionary attack
Brute force
Weak password

Correct Answer:

Composed of information commonly known about the individual
Typically the most time consuming way to crack a password
Uses a list of common passwords to try to crack an unknown password
Examines network traffic for known attack signatures
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents