Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)

IT Questions BankCategory: Cybersecurity EssentialsTechnicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)

Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)

  • Both systems scramble the passwords before hashing.
  • The systems use different hashing algorithms.
  • One system uses hashing and the other uses hashing and salting.
  • Both systems use MD5.
  • One system uses symmetrical hashing and the other uses asymmetrical hashing.

Explanation: Hashing can be used in many different situations to ensure data integrity.

More Questions: Cybersecurity Essentials FINAL Quiz Answers Full


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x