Many password recovery tools have a feature for generating potential password lists for which type of attack?

a. Brute-force
b. Password dictionary
c. Birthday
d. Salting


ANSWER: b

Computer Science & Information Technology

You might also like to view...

The process in which you link objects such as hands to arms and define their relationships and limits (for example, elbows cannot bend backwards), then drag these parts around and let the computer calculate the result is called:

a. rotoscoping b. de-morphing c. meta-articulation d. cyber-motion e. inverse kinematics

Computer Science & Information Technology

Case 8-1Carmella is putting together an order processing system for her local pizza parlor, Pete's Italian Pies.In testing the JavaScript below, Carmella discovers that the onClick event looks and acts like the ____ events she used in another project.

A. onMouseOver B. onMouseOut C. onLoad D. all of the above

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. When scanning, use the largest original you can 2. The Spot Healing Brush Tool requires you to choose the sampled (source) area 3. The Healing Brush Tool creates an exact copy 4. The Red Eye Tool does not work with RGB color mode 5. A higher percentage in the Exposure box reduces the effect of burning or dodging.

Computer Science & Information Technology

What is a hot-swappable device?

What will be an ideal response?

Computer Science & Information Technology