1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
14

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p

assword file with lines consisting of:
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
4 0

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

You might be interested in
____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
liq [111]
<span>Access controls define the allowable interactions between subjects and objects.
</span>They define contains rules which govern the interactions between subjects and objects and permissions subjects can grant to other subjects. The interactions between subjects and objects can be:<span> take, grant, create, remove...</span>
8 0
3 years ago
Read 2 more answers
What is the best application to keep track of inventory for a store?
exis [7]

"The site iGeeks Blog recommends Inventory Tracker, which functions as a comprehensive inventory tracking system for iPad.

"It works excellently in synchronizing your inventory and comes with some really amazing features that you’d only expect from a desktop app," said the blog.

A free version of the app is available, and the pro version is just $3.99."

3 0
4 years ago
Brianna Watt, a consultant doing business as Watt Gives, wants a program to create an invoice for consulting services. Normally,
GREYUIT [131]

Answer:

The pseudocode is as follows:

Total_Hours = 0

Input Client_Name

Rate = 30.00

For days = 1 to 5

      Input Hours_worked

      Total_Hours = Total_Hours + Hours_Worked

Charges = Rate * Total_Hours

Print "Brianna Watt"

Print Client_Name

Print Total_Hours

Print Rate

Print Charges

Explanation:

This initializes the total hours worked to 0

Total_Hours = 0

This gets input for the client name

Input Client_Name

This initializes the standard rate to 30.00

Rate = 30.00

This iterates through the 5 days of work

For days = 1 to 5

This gets input for the hours worked each day

      Input Hours_worked

This calculates the total hours worked for the 5 days

      Total_Hours = Total_Hours + Hours_Worked

This calculates the total charges

Charges = Rate * Total_Hours

This prints the company name

Print "Brianna Watt"

This prints the client name

Print Client_Name

This prints the total hours worked

Print Total_Hours

This prints the standard rate

Print Rate

This prints the total charges

Print Charges

7 0
3 years ago
EMERGENCY- I am giving 55 points for this, please help. WITH working out
lisov135 [29]

Answer:

360 kilobytes

Explanation:

(Time × Bitrate) / 8

30 × 96 = 2880 / 8

360 kilobytes

8: kilobits in a kilobyte

Time is always in seconds to obey the kb*ps* rule

Bitrate is always on bits so thats kilobits not kilobytes purpose of conversion

8 0
3 years ago
What are the benefits of using presentations to organize and deliver information?
bearhunter [10]
Hello.

The benefits of using presentations to organize and deliver information are: it keeps things in order, keeps peoples attention longer, and it looks more professional.
4 0
3 years ago
Other questions:
  • In the 1950s, the three major networks (ABC, NBC, and CBS) developed prime-time shows that would appeal to a general family audi
    11·1 answer
  • Tim is in charge of the upcoming interschool baketball tournamnent. He wants to arrange all of the teams and their members in al
    15·1 answer
  • Write a literal representing the false value in c++.
    11·1 answer
  • A(n) ______ chart is drawn on the same worksheet as the data.
    10·1 answer
  • What feature would be used to collect how many times users downloaded a product catalog?
    11·1 answer
  • Which is not a key factor a programmer uses in selecting the language for a project?
    9·1 answer
  • If Phil is putting exact phrases in quotation marks while searching for information, he's using which of the following?
    14·1 answer
  • When you begin creating a new powerpoint presentation, you need to select a ____.?
    13·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!