The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?

A. Collision resistance
B. Rainbow table
C. Key stretching
D. Brute force attack


Answer: C. Key stretching

Computer Science & Information Technology

You might also like to view...

The quality of your printed document depends on its ____.

A. print resolution B. computer C. scanner D. e-mail system

Computer Science & Information Technology

Where are you most likely to find a PKES system?

A. An automobile B. An airplane C. A railroad car D. A government building

Computer Science & Information Technology

What is normally the best color combination for ease of reading?

A) Dark text on a moderate background B) Light text on a dark background C) Dark text on a light background D) Light text on a moderate background

Computer Science & Information Technology

When you trim a video, the ________ of the timeline indicates the portion of the video that will play during the slide; the ________ portion indicates the portion that is trimmed

A) blue section; black B) blue section; gray C) green section; black D) green portion; red

Computer Science & Information Technology