When using MD5 hashing with the enable secret command, what process is taken with the user-entered password to verify its correctness?

A) The user-entered password is hashed and compared to the stored hash.
B) The user-entered password is compared to the stored value directly.
C) The user-entered password is hashed and compared to the cleartext password.
D) The stored hash is reversed and compared to the user-entered password.


A
Explanation: A) MD5 hashes the value and the hash is stored, so when a user types a password, the user-entered password is converted to a hash and compared to the stored hash.

Computer Science & Information Technology

You might also like to view...

________ is similar to an e-mail mailing list

A) A bookmark B) A wiki C) A newsgroup D) YouTube

Computer Science & Information Technology

A(n) _________________________ is a business that brings together affiliate marketing program advertisers with willing publishers and manages the process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An administrative scope is composed of multicast addresses intended to be used in a public network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?Identify the grouping element which contains an illustration, photo, diagram, or similar object that is cross-referenced elsewhere in a document.

A. ?figure B. ?character C. ?image D. picture?

Computer Science & Information Technology