Many password recovery tools have a feature for generating potential password lists for which type of attack?
a. Brute-force
b. Password dictionary
c. Birthday
d. Salting
ANSWER: b
You might also like to view...
The process in which you link objects such as hands to arms and define their relationships and limits (for example, elbows cannot bend backwards), then drag these parts around and let the computer calculate the result is called:
a. rotoscoping b. de-morphing c. meta-articulation d. cyber-motion e. inverse kinematics
Case 8-1Carmella is putting together an order processing system for her local pizza parlor, Pete's Italian Pies.In testing the JavaScript below, Carmella discovers that the onClick event looks and acts like the ____ events she used in another project.
A. onMouseOver B. onMouseOut C. onLoad D. all of the above
Answer the following statement(s) true (T) or false (F)
1. When scanning, use the largest original you can 2. The Spot Healing Brush Tool requires you to choose the sampled (source) area 3. The Healing Brush Tool creates an exact copy 4. The Red Eye Tool does not work with RGB color mode 5. A higher percentage in the Exposure box reduces the effect of burning or dodging.
What is a hot-swappable device?
What will be an ideal response?