题目
单项选择题
A hash of data can be identified with ________ attacks, so it is customary to add ________ to a hash to ensure that the hash value appears to be different each time it is used.
查看解析
标准答案
Please login to view
思路分析
The question asks about two linked ideas in hashing: the type of attack that can be used to identify a hash of data, and the technique used to make hashes appear different on each use. First, consider dictionary attacks: these involve using a prepared list of common values (like common passwords or data patterns) to compute hashes and look for matches. This is a well-k......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
When designing a secure system, why is hashing preferred over encryption for storing passwords?
An important technique to mitigate password dictionary attacks is to ___________.
__________ is a technique used to help protect against attacks exposing the contents of the server where password information is stored.
Suppose a system stores passwords like this: For each user, a unique salt is randomly generated and stored along with the password hash. Additionally, the system uses a single global secret pepper, not stored in the database, but hardcoded into the backend server. Which of the following statements are correct? (Select all that apply.)
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!