Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attackerĀ can simply look up a hashed password and read out the text version.

A. timing matrix
B. agile scrum
C. rainbow table
D. smurf list

Answer: C

Computer Science & Information Technology

You might also like to view...

What field property would allow the user to enter "" into a field with a Short Text data type?

A) Indexed B) Allow Null Length C) Allow Zero Length D) Required

Computer Science & Information Technology

A(n) ________ is used to mark specific positions for text alignment

A) text box B) indent C) tab stop D) margin

Computer Science & Information Technology