1.

Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.

A. Syllable attack
B. Rule-based attack
C. Offline attack
D. Hybrid attack
Answer» C. Offline attack


Discussion

No Comment Found