Which password attack method uses a list that contains hashed values and clear text equivalents in order to speed up the process of gaining entry to a system?

IT Questions BankCategory: IoT SecurityWhich password attack method uses a list that contains hashed values and clear text equivalents in order to speed up the process of gaining entry to a system?

Which password attack method uses a list that contains hashed values and clear text equivalents in order to speed up the process of gaining entry to a system?

  • dictionary attack
  • password sniffing and cracking attack
  • brute force
  • rainbow tables

Explanation: Rainbow tables contain hashed values and clear text equivalents which allow intercepted hashes to be looked up without actually unencrypting the hashed password.

Exam with this question: IoT Security 1.1 Chapter 6 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments