Question: Question 10 (1 point) A dictionary attack is being used by an attacker to break into a network. What does this mean? a The attacker
Question 10 (1 point) A dictionary attack is being used by an attacker to break into a network. What does this mean? a The attacker is using a secret list of code words. b All of these answers are correct. c The attacker is using only lowercase letter for unknown words. d The attacker is using known passwords and many variations of upper-and lowercase combinations. e The attacker is using only uppercase letters for common words. Question 11 (1 point) Network operations documentation includes which of the following? a Asset management b Network drawings and diagrams c Vendor documentation d All of the above Question 12(1 point) Verifying a username and password is part of which process? Authorization Authentication Permissions a b d Accounting
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
