1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
14

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p

assword file with lines consisting of:
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
4 0

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

You might be interested in
how can you create fades with the smart tool? How can you specify the types of fade curves that are used with the smart tool?
ra1l [238]

Answer:

The correct answer to the following question is:

To create fades you can click and then drag the end of the clip with a smart tool.

Fade Dialog Box is the fade curve.  

Explanation:

Smart Tool is an application which also provide their users with the features of the quick access menu by which they can easily access their programs or the software.

By using smart tool the user also creates a crossfade.

8 0
3 years ago
What permission do users have by default regarding printer access and the ability to manage documents?
Gnesinka [82]
<span>You can view documents across all print queues and print devices.

</span>
8 0
3 years ago
_______ make up the basic structure of a relational database with columns containing field data and rows containing record infor
Klio2033 [76]
QR codes make up the basic structure of a relational database with columns containing field data and rows containing record information.
3 0
3 years ago
Read 2 more answers
What are the elements of a good study environment? Check all that apply.
finlep [7]

The elements of a good study environment are that it must be well lit the resources are near it is quite and it is clutter free

Explanation:

A good study environment must be an environment that will promote the good study conditions and it must be quite and calm if a person studies in that environment all the resources like the food water and the other refreshments must be available in that environment

The environment must be clean and it must be clutter free without any disturbances and hence these are the factors that will promote the good study environment

3 0
3 years ago
Read 2 more answers
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
Other questions:
  • Which of the following is a template definition?
    5·1 answer
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
    12·1 answer
  • Preesure is drived quantity? why​
    15·2 answers
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
    5·1 answer
  • What is a googleplex?
    7·1 answer
  • How do you respond to an email?
    6·1 answer
  • Convert<br> 0.625 to binary
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!