✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Two pen testers are attempting to crack hash values found in a password file. The first tester uses a rather large file containing a list of possible passwords. The second uses a similar list but configures the cracker to substitute numbers and symbols. Which of the following statements is true?