When using MD5 hashing with the enable secret command, what process is taken with the user-entered password to verify its correctness?
A) The user-entered password is hashed and compared to the stored hash.
B) The user-entered password is compared to the stored value directly.
C) The user-entered password is hashed and compared to the cleartext password.
D) The stored hash is reversed and compared to the user-entered password.
A
Explanation: A) MD5 hashes the value and the hash is stored, so when a user types a password, the user-entered password is converted to a hash and compared to the stored hash.
You might also like to view...
When fields are added to the formula input box for a PivotTable, they do retain their descriptive names
Indicate whether the statement is true or false
Viruses that perform no explicit malicious behaviors are called bacteria or rabbits. Explain how such seemingly benign viruses can still have negative impacts on computer systems
What will be an ideal response?