Attackers who compromise websites often acquire databases of hashed passwords. What technique can best protect these passwords against automated password cracking attacks that use precomputed values?
A. Using the MD5 hashing algorithm
B. Using the SHA-1 hashing algorithm
C. Salting
D. Double-hashing
Answer: C. Salting
Computer Science & Information Technology
You might also like to view...
What does “the closest specification wins” mean? Give a detailed example in your answer
What will be an ideal response?
Computer Science & Information Technology
The procedural component of USB is probably the most involved of the four components.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
An iterative solution involves loops.
What will be an ideal response?
Computer Science & Information Technology
Businesses actively solicit reviews of their sites by participants at social ____ or tagging sites to build traffic to their sites.
A. intermediation B. bookmarking C. infomediary D. customization
Computer Science & Information Technology