QUESTION IMAGE
Question
which of the following methods would likely be most successful when attempting to gain access to a password - protected file found on a computer?
a. solicit the password from the uncooperative suspect.
b. use a brute - force attack on the password - protected file.
c. use a dictionary attack on the password - protected file.
d. use a tool to build a password profile of the suspect to attack the password - protected file.
- Option a: An uncooperative suspect will not provide the password, so this fails.
- Option b: Brute-force attacks test all possible character combinations, which is extremely slow and often blocked by modern security, making it inefficient.
- Option c: Dictionary attacks only test common words/phrases, which is ineffective if the password is complex.
- Option d: Building a password profile uses personal information (like names, birthdays, hobbies) of the suspect, as most users create passwords tied to their personal life. This targets likely password patterns, making it the most successful method.
Snap & solve any problem in the app
Get step-by-step solutions on Sovi AI
Photo-based solutions with guided steps
Explore more problems and detailed explanations
d. Use a tool to build a password profile of the suspect to attack the password-protected file.