A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.
A. rainbow table
B. dictionary
C. crib
D. crack file
Answer: A
You might also like to view...
A(n) ________ can eliminate the geographical limitations of a LAN
Fill in the blank(s) with correct word
Which of the following is the best way to capture digital videos?
A. Capture at least a few seconds of extra footage at the beginning and end of the clip segment than you expect you will need. B. Capture at least a few seconds of extra footage at the beginning of the clip segment than you expect you will need, but no extra seconds at the end of the clip. C. Capture at least a few seconds of extra footage at the end of the clip segment than you expect you will need, but no extra seconds at the beginning of the clip. D. Capture only the clip segment you expect you will need, with no extra seconds at the beginning or end of the clip.