Which technique adds a random string to a password before hashing?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique adds a random string to a password before hashing?

Explanation:
This technique uses a random value, called a salt, that is combined with the password before applying the hash function. The salt is typically unique for each password. By mixing the salt with the password, even identical passwords yield different hash outputs, so precomputed rainbow tables become ineffective because those tables would have to be created for every possible salt. The salt is stored with the resulting hash in the database so the system can verify future logins. Modern practice also employs strong hashing algorithms (like bcrypt, scrypt, or Argon2) that handle salting and add work factors to slow down attackers. Rainbow tables are precomputed hash lists used for cracking; password hashing is the general conversion process, not the specific randomizing step; brute force is an attack method, not a protective technique.

This technique uses a random value, called a salt, that is combined with the password before applying the hash function. The salt is typically unique for each password. By mixing the salt with the password, even identical passwords yield different hash outputs, so precomputed rainbow tables become ineffective because those tables would have to be created for every possible salt. The salt is stored with the resulting hash in the database so the system can verify future logins. Modern practice also employs strong hashing algorithms (like bcrypt, scrypt, or Argon2) that handle salting and add work factors to slow down attackers. Rainbow tables are precomputed hash lists used for cracking; password hashing is the general conversion process, not the specific randomizing step; brute force is an attack method, not a protective technique.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy