When using MD5 hashing with the enable secret command, what process is taken with the user-entered password to verify its correctness?
A) The user-entered password is hashed and compared to the stored hash.
B) The user-entered password is compared to the stored value directly.
C) The user-entered password is hashed and compared to the cleartext password.
D) The stored hash is reversed and compared to the user-entered password.
A
Explanation: A) MD5 hashes the value and the hash is stored, so when a user types a password, the user-entered password is converted to a hash and compared to the stored hash.
You might also like to view...
________ is similar to an e-mail mailing list
A) A bookmark B) A wiki C) A newsgroup D) YouTube
A(n) _________________________ is a business that brings together affiliate marketing program advertisers with willing publishers and manages the process.
Fill in the blank(s) with the appropriate word(s).
An administrative scope is composed of multicast addresses intended to be used in a public network.
Answer the following statement true (T) or false (F)
?Identify the grouping element which contains an illustration, photo, diagram, or similar object that is cross-referenced elsewhere in a document.
A. ?figure B. ?character C. ?image D. picture?