1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
9

5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred

Computers and Technology
1 answer:
Anton [14]3 years ago
6 0

Answer:

Rainbow table attack

Explanation:

A rainbow table attack is a type of network attack or hacking where the hacker tries to utilize a rainbow hash table to crack the passwords in a database system. A rainbow table itself is a hash function used in cryptography for saving important data in a database. Especially passwords.

In this process, sensitive data are hashed two or multiple times with the same key or with different keys so as to avoid rainbow table attack. In a rainbow table attack, the hacker simply compares the hash of the original password against hashes stored in the rainbow table and when they find a match, they then identify the password used to create the hash.

You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
3 years ago
​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database
jeyben [28]

Answer:

B. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

Explanation:

Certain departments will require certain information for certain processes. It is not recommendable for every user to access every information of the company as it may reveal vital information.

Hence, every role and department should be given certain privileges to information according to the tasks and needs of the role.

5 0
3 years ago
You completed the wireframe step of mobile app development. Which statement is true about this step?
UkoKoshka [18]

The statement that is true about this step is that:

  • You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
  • In this step, you defined your target audience and main goal.

<h3>How wireframe is made to create mobile apps?</h3>

The Steps for wireframing are:

  • Begin by mapping out a specific user flow.
  • Do a Sketch of the core part and then begin wireframing by setting a Mobile Frame.
  • Se the layout using boxes and use design patterns.
  • Make sure to link the pages together to create a flow.

Note that The statement that is true about this step is that:

  • You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
  • In this step, you defined your target audience and main goal.

Learn more about wireframe  from

brainly.com/question/12734458

#SPJ1

5 0
2 years ago
user complains that his monitor is not working. You must diagnose the problem to return the monitor to normal operation. What ar
const2013 [10]

Answer:

The four primary sources of display problems are;

1) Monitor

2) Video Cable

3) Video driver

4) Video adapter card

Explanation:

1) Monitor

A computer monitor also known as a video display unit, VDT, or video display terminal is an output device that displays pictorial information sent from the video card

2) Video cable

The data connection cable from the monitor to the video card

3) Video driver

The program that enables the operating system work with the installed video card

4) Video adapter card

A card converts image data information into images information for display by a display output device.

3 0
3 years ago
30 POINTS
avanturin [10]

Answer:

i- why is there so many words!!!

4 0
3 years ago
Other questions:
  • Virus infections often disable antivirus programs and prevent them from being enabled
    13·1 answer
  • Consider the helicopter of Example 2.1, but with a slightly different definition of the input and output. Suppose that, as in th
    6·1 answer
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • An operating system coordinations the___ of a computers operation
    8·1 answer
  • Which fact does lean green eco machines present to show that electric cars are not perfect
    13·2 answers
  • What is technology? *
    10·1 answer
  • Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
    7·1 answer
  • What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a
    6·1 answer
  • If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only commu
    8·1 answer
  • The part of the computer that provides access to the internet is the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!