Which of the following programs extends decryption capabilities beyond a singlecomputer by using the distributed power of multiple computers across a network to decrypt files and recover passwords?

a. Password Recovery Toolkit
b. FTK Imager
c. Distributed Network Attack
d. Registry Viewer


c

Criminal Justice

You might also like to view...

A chemical method used for developing prints on nonporous surfaces is:

a. Physical developer. b. Ninhydrin. c. Applying the dye rhodamine 6G after fuming with cyanoacrylate. d. DFO.

Criminal Justice

Which of the following is not one of the principles of Sutherland's differential associations?

a. Criminal behavior is learned. b. Criminal behavior is learned in interaction with other persons in a process of communication. c. Crime is the result of a lack of serious punishments for deviant behavior. d. Differential association may vary in frequency, duration, priority, and intensity.

Criminal Justice

Which is true about the insanity defense?

A) A large number of criminals escape punishment using the insanity defense. B) Every state in the United States has an option for defendants to claim insanity. C) The insanity defense is rarely used by defendants. D) The American criminal system has banned the use of the insanity defense. E) Defendants who claim insanity must be incarcerated in prisons rather than mental hospitals.

Criminal Justice

Which of the following is the basic category that places great emphasis on order maintenance and individual officer discretion?

A) legalistic style B) watchman style C) service style D) community-policing style

Criminal Justice