1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
14

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p

assword file with lines consisting of:
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
4 0

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

You might be interested in
What is the primary purpose of endnotes?
mihalych1998 [28]

Answer:

They acknowledge the source of a quotation, paraphrase, or summary; and (2) They provide explanatory comments that would interrupt the flow of the main text.so its B

5 0
3 years ago
Read 2 more answers
All changes
Vsevolod [243]

You should get up and move every 30 minutes

Hope  this helps

-scav

7 0
3 years ago
Select the best option that should be considered when preparing these images to.be used for the web
DerKrebs [107]
The answer is 1) JPEG  2) TIFF   3) BMP.  
<span>The best option that should be considered when preparing these images to.be used for the web :
</span>1) JPG (jpeg) - Used to compress web images to a small file size without
    sacrificing quality
2) TIFF (tiff) - Used for professional print images to save in a uncompressed 
     file format at high resolution.
3) BMP - Used for either web or print because of the ability to save high
    quality images ether compressed or uncompressed.
6 0
3 years ago
Do individuals have a privacy interest in their smartphones' locations?
Rzqust [24]

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

6 0
3 years ago
4. When the keyword ____________________ is followed by a parenthesis, it indicates a call to the superclass constructor.
Andreyy89

Answer:

Super

Explanation:

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

Hence, when the keyword super is followed by a parenthesis, it indicates a call to the superclass constructor and it should be the first statement declared in the subclass constructor.

5 0
2 years ago
Other questions:
  • April 107 90 29 31 66 0.344
    8·1 answer
  • Which of the following is the rarest and most valuable mineral ore among the native elements?
    13·1 answer
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    10·2 answers
  • The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
    10·2 answers
  • a corporation needs an operating system that allows the various teams in its office to network &amp; collaborate on projects. wh
    11·2 answers
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • How does the teacher know you have completed your assignment in Google Classroom?
    12·1 answer
  • Which browser feature will delete your history, cache, and cookies the moment you close the special window
    6·1 answer
  • How do we ensure that future technologies are fair to society?
    11·1 answer
  • List at least 5 features that can be used to format a report.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!