1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
14

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p

assword file with lines consisting of:
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
4 0

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

You might be interested in
Is an example of a relational database management system? (ORACLE ,SQL,JAVA,Python)
olganol [36]

Answer:

The correct answer for the given question is "ORACLE ".

Explanation:

ORACLE is an relational database management system oracle can store the interrelated data .Oracle database management system is used for online transaction etc .It is first company in Relational database management System.

SQL is an structural query language it is used to communicate with a database it is not relational database management system so this option is wrong.

Java and python are the programming language they are not relational database management system so this option is wrong.

So correct answer is "ORACLE "

6 0
3 years ago
What allow you to write alphas on a computer keyboard
lions [1.4K]

Answer:

"To create any of these Greek letters using the Alt codes, simply press the "Alt" key while simultaneously typing the listed number. For example, to create the Greek letter Alpha (α), press the "Alt" key and type 224 using the keypad at the right side of your keyboard." - GOOGLE

5 0
3 years ago
I want to find Web pages that deal with the ethical aspects of genetic engineering. I also want to limit my results to education
ankoles [38]

Answer:

"ethical aspects of genetic engineering" AND site:.edu

Explanation:

Google search defines the following operators:

" "  --> search for the exact phrase between <em>quotes</em>.

site: --> search for specific <em>sites </em><em>or domains </em>by adding "site:" in front.

AND --> Limit  results to include both statements joined with <em>AND</em>.

In a generic way:

" <em>exact phrase to search</em> " AND site: <em>domain</em>

In this example:

" ethical aspects of genetic engineering " AND site:.edu

7 0
3 years ago
64 bits 32 bits 16 bits 8 bits 4 bits 2 bits 1 bit half bit quater bit THE GAME WATCH
Romashka-Z-Leto [24]

Answer:

what?

Explanation:

explain a little better please

5 0
3 years ago
Which sign or symbol will you use to lock cells for absolute cell reference?
jek_recluse [69]

Answer:asterisk

Explanation:

In spreadsheet applications, a reference to a particular cell or group of cells that does not change, even if you change the shape or size of the spreadsheet, or copy the reference to another cell.

3 0
3 years ago
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • 9) If you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at: a) [00:05:00] b) [00:00:00]
    9·1 answer
  • Computer security:
    15·1 answer
  • Which type of word processing programs enables us to include illustrations within the program?
    6·1 answer
  • The ArrayList class ____ method returns the current ArrayList size.
    8·1 answer
  • View focuses on the text and content of a document, without much information on the page layout.
    13·1 answer
  • The following procedure is intended to return the number of times the value val appears in the list nylist. The procedure does n
    15·2 answers
  • Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3
    7·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
  • A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!