Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)
- Both systems scramble the passwords before hashing.
- The systems use different hashing algorithms.
- One system uses hashing and the other uses hashing and salting.
- Both systems use MD5.
- One system uses symmetrical hashing and the other uses asymmetrical hashing.
Explanation: Hashing can be used in many different situations to ensure data integrity.
More Questions: Cybersecurity Essentials FINAL Quiz Answers Full