In a 'Dictionary Attack', What does an attacker primarily use ________.
1) Books to confuse the target system
2) Precomputed hash values
3) A real dictionary to decipher codes
4) A list of probable passwords