Which of the following cryptographic attacks would salting of passwords render ineffective?

A. Brute force
B. Dictionary
C. Rainbow tables
D. Birthday


Answer: C. Rainbow tables

Computer Science & Information Technology

You might also like to view...

__________ refers to the physical components that a computer is made of.

a. The device b. Hardware c. Software d. The system

Computer Science & Information Technology

Table content can include both graphics and text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ is a platform of collaboration software based on a server, which allows people in a business or enterprise to set up websites to share information, and publish and manage documents and reports

Fill in the blank(s) with correct word

Computer Science & Information Technology

Critical Thinking QuestionsCase 2You have been receiving your podcasts via Web-based podcast services. You now have your own portable media player, and are thinking about client podcast readers. What is a popular client podcast reader? a.Apple iTunesc.Odeob.Audacityd.FeedBurner

What will be an ideal response?

Computer Science & Information Technology