Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attackerĀ can simply look up a hashed password and read out the text version.
A. timing matrix
B. agile scrum
C. rainbow table
D. smurf list
Answer: C
Computer Science & Information Technology
You might also like to view...
What field property would allow the user to enter "" into a field with a Short Text data type?
A) Indexed B) Allow Null Length C) Allow Zero Length D) Required
Computer Science & Information Technology
A(n) ________ is used to mark specific positions for text alignment
A) text box B) indent C) tab stop D) margin
Computer Science & Information Technology