Which one of the following conditions is NOT necessary for a long dictionary attack to succeed?
Which one of the following conditions is NOT necessary for a long dictionary attack to succeed?
What is an important factor affecting the time required to perpetrate a manual trial and error attack to gain
What is an important factor affecting the time required to perpetrate a manual trial and error attack
to gain access to a target computer system?
Which one of the following BEST describes a password cracker?
Which one of the following BEST describes a password cracker?
what type of attack is possible?
If a token and 4-digit personal identification number (PIN) are used to access a computer system
and the token performs off-line checking for the correct PIN, what type of attack is possible?
Which of the following actions can increase the cost of an exhaustive attack?
Which of the following actions can increase the cost of an exhaustive attack?
Which of the following attacks focus on cracking passwords?
Which of the following attacks focus on cracking passwords?
Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?
Which of the following can best eliminate dial-up access through a Remote Access Server as a
hacking vector?
What is known as decoy system designed to lure a potential attacker away from critical systems?
What is known as decoy system designed to lure a potential attacker away from critical systems?
Which of the following will you consider as a program that monitors data traveling over a network?
Which of the following will you consider as a program that monitors data traveling over a network?
Which of the following is NOT a system-sensing wireless proximity card?
Which of the following is NOT a system-sensing wireless proximity card?