Multiple Choice
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) __________.
A) rainbow table
B) dictionary
C) crib
D) crack file
Correct Answer:

Verified
Correct Answer:
Verified
Q25: As frustrating as viruses and worms are,
Q26: A(n) <u>polymorphic</u> threat is one that over
Q27: A(n) _ hacks the public telephone network
Q28: _ is the premeditated, politically motivated attacks against
Q29: A short-term decrease in electrical power availability is
Q31: Web hosting services are usually arranged with
Q32: Compared to Web site defacement, vandalism within
Q33: A momentary low voltage is called a(n)
Q34: "Shoulder <u>spying</u>" is used in public or
Q35: Suppose an act of theft performed by