What is the name of a cryptographic attack based on a database of pre-computed hash values and the original plaintext values?
A. Brute force attack
B. Rainbow table attack
C. Frequency analysis
D. Chosen plaintext attack
Answer: B. Rainbow table attack
Computer Science & Information Technology
You might also like to view...
Write the syntax of a tcpdump command that captures packets containing IP datagrams with a source or destination IP address equal to 10.0.1.12.
What will be an ideal response?
Computer Science & Information Technology
Give a formula for the maximum throughput of a mutual exclusion system in terms of the synchronization delay.
What will be an ideal response?
Computer Science & Information Technology
Briefly describe the L2TP protocol.
What will be an ideal response?
Computer Science & Information Technology
What are biometric devices?
What will be an ideal response?
Computer Science & Information Technology