An auditor is reviewing the following output from a password-cracking tool: User:1: Password1 User2: Recovery! User3: Alaskan10 User4: 4Private User5: PerForMance2 Which of the following methods did the author MOST likely use?
A) Hybrid
B) Dictionary
C) Brute force
D) Rainbow table
Correct Answer:
Verified
Q748: An application developer is designing an application
Q749: Multiple organizations operating in the same vertical
Q750: A company was recently audited by a
Q751: A system's administrator has finished configuring firewall
Q752: A system administrator is reviewing the following
Q754: Before an infection was detected, several of
Q755: A company has a data system with
Q756: A Chief Information Officer (CIO) drafts an
Q757: Which of the following types of keys
Q758: Which of the following must be intact
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents