What is the name of a cryptographic attack based on a database of pre-computed hash values and the original plaintext values?

A. Brute force attack
B. Rainbow table attack
C. Frequency analysis
D. Chosen plaintext attack


Answer: B. Rainbow table attack

Computer Science & Information Technology

You might also like to view...

Write the syntax of a tcpdump command that captures packets containing IP datagrams with a source or destination IP address equal to 10.0.1.12.

What will be an ideal response?

Computer Science & Information Technology

Give a formula for the maximum throughput of a mutual exclusion system in terms of the synchronization delay.

What will be an ideal response?

Computer Science & Information Technology

Briefly describe the L2TP protocol.

What will be an ideal response?

Computer Science & Information Technology

What are biometric devices?

What will be an ideal response?

Computer Science & Information Technology