Attackers who compromise websites often acquire databases of hashed passwords. What technique can best protect these passwords against automated password cracking attacks that use precomputed values?

A. Using the MD5 hashing algorithm
B. Using the SHA-1 hashing algorithm
C. Salting
D. Double-hashing


Answer: C. Salting

Computer Science & Information Technology

You might also like to view...

What does “the closest specification wins” mean? Give a detailed example in your answer

What will be an ideal response?

Computer Science & Information Technology

The procedural component of USB is probably the most involved of the four components.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An iterative solution involves loops.

What will be an ideal response?

Computer Science & Information Technology

Businesses actively solicit reviews of their sites by participants at social ____ or tagging sites to build traffic to their sites.

A. intermediation B. bookmarking C. infomediary D. customization

Computer Science & Information Technology