Ben is concerned about password cracking attacks against his system. He would like to implement controls that prevent an attacker who has obtained those hashes from easily cracking them. What two controls would best meet this objective?
A. Longer passwords and salting
B. Over-the-wire encryption and use of SHA1 instead of MD5
C. Salting and use of MD5
D. Using shadow passwords and salting
Answer: A. Longer passwords and salting
Computer Science & Information Technology
You might also like to view...
Which of the following sections of the Acceptable Use Agreement dictates how information must be stored, transmitted, and communicated?
A. Introduction B. Data classification C. Applicable policy statements D. Handling standards
Computer Science & Information Technology
Why is it not necessary to add extra space between sentences by pressing the spacebar twice?
What will be an ideal response?
Computer Science & Information Technology