This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Encryption
B. Firewall
C. Password
Dictionary attack
查看答案
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
A. Worm
B. Fake
C. Virus
D. Rogue
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
A. Restriction
B. Security
C. Protection
D. Encryption
A _______ acts as a security buffer between a corporation's private network and all external networks.
A. firewall
B. password
C. disaster recovery plan
D. virus checker
Which of the following is the most widely used wireless network encryption for home wireless networks?
A. WEP
B. WPE
C. WPA
D. WPA2