A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as:
A. Symmetric cryptography.
B. Private key cryptography.
C. Salting.
D. Rainbow tables.
Ans: C. Salting.
You might also like to view...
In regard to a CAT6 cable, what pin numbers in an RJ-45 connecter are used to carry data in a Fast Ethernet network?
What will be an ideal response?
The break method facilitates which of the following actions?
A. Terminates the execution of a loop. B. Repeats the current loop execution without evaluating the condition or iterating. C. Stops the current iteration of the loop and immediately begins a new iteration. D. Restarts the loop from the beginning, resetting the value of the iterator.
What technology is used in Windows Vista and 7 to encrypt an entire hard disk volume?
A) TPM B) BitLocker C) EFS D) RFID
A database table's physical sort order is the order in which records are arranged on storage devices.
Answer the following statement true (T) or false (F)