Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-901 Topic 8 Question 88 Discussion

Actual exam question for Cisco's 350-901 exam
Question #: 88
Topic #: 8
[All 350-901 Questions]

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Celeste
5 days ago
Peppering? What is this, a spice rack? I'll stick with good old salting, thank you very much.
upvoted 0 times
...
Jovita
7 days ago
I was about to choose B, but then I remembered that asymmetric encryption is for securing communication, not storing passwords. Good thing I double-checked the options!
upvoted 0 times
...
Michael
17 days ago
Option C is the correct answer. Salting the passwords makes it much harder for attackers to crack them one by one.
upvoted 0 times
Luisa
5 days ago
B: I agree, salting the passwords will make it harder for attackers to crack them one by one.
upvoted 0 times
...
German
6 days ago
A: I think the best approach is to apply the salting technique.
upvoted 0 times
...
...
Paris
1 months ago
I'm not sure, but I think using asymmetric encryption could also be a good option to store passwords securely.
upvoted 0 times
...
Christiane
1 months ago
I agree with Hermila, salting the passwords makes it harder for attackers to crack them all at once.
upvoted 0 times
...
Hermila
1 months ago
I think the best approach is to apply the salting technique.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77