A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.

A. rainbow table 
B. dictionary
C. crib
D. crack file


Answer: A

Computer Science & Information Technology

You might also like to view...

The ____ sound file format is used primarily on UNIX workstations.

A. RealAudio B. AU C. AIFF D. MIDI

Computer Science & Information Technology

Consider the two tables T1 and T2 shown in Figure 6.15. Show the results of the following operations:

What will be an ideal response?

Computer Science & Information Technology

?Case 4-3 Akira is a freelance content writer and uses the Internet to research about the topics that she works on. She needs constant high-speed Internet connectivity to upload and download necessary information. Akira observes that, off-late, her internet connection has slowed down to a great extent. Which of the following should Akira perform to fix this issue?

A. ?Replace the network interface card B. ?Trypower cycling the system's modem and router C. ?Try connect to nearby hotspots or hotzones. D. ?Replace the existing Ethernet cable and the modem with new ones

Computer Science & Information Technology

Match the following terms to their meanings:

I. Heading style II. .txt III. .rtf IV. Platform V. Source file A. permits files to be shared across platforms B. set of formatting characteristics C. contains information to be inserted D. file created in Notepad E. combination of hardware and software on a computer

Computer Science & Information Technology