A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.
A. rainbow table
B. dictionary
C. crib
D. crack file
Answer: A
You might also like to view...
The ____ sound file format is used primarily on UNIX workstations.
A. RealAudio B. AU C. AIFF D. MIDI
Consider the two tables T1 and T2 shown in Figure 6.15. Show the results of the following operations:
What will be an ideal response?
?Case 4-3 Akira is a freelance content writer and uses the Internet to research about the topics that she works on. She needs constant high-speed Internet connectivity to upload and download necessary information. Akira observes that, off-late, her internet connection has slowed down to a great extent. Which of the following should Akira perform to fix this issue?
A. ?Replace the network interface card B. ?Trypower cycling the system's modem and router C. ?Try connect to nearby hotspots or hotzones. D. ?Replace the existing Ethernet cable and the modem with new ones
Match the following terms to their meanings:
I. Heading style II. .txt III. .rtf IV. Platform V. Source file A. permits files to be shared across platforms B. set of formatting characteristics C. contains information to be inserted D. file created in Notepad E. combination of hardware and software on a computer