A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?
Validating the code signature is the best way to verify software authenticity, as it ensures that the software has not been tampered with and that it comes from a verified source. Code signatures are digital signatures applied by the software vendor, and validating them confirms the software's integrity and origin. Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.
In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?
Adding a random string of characters, known as a 'salt,' to a password before hashing it is known as salting. This technique strengthens passwords by ensuring that even if two users have the same password, their hashes will be different due to the unique salt, making it much harder for attackers to crack passwords using precomputed tables. Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.
In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?
Adding a random string of characters, known as a 'salt,' to a password before hashing it is known as salting. This technique strengthens passwords by ensuring that even if two users have the same password, their hashes will be different due to the unique salt, making it much harder for attackers to crack passwords using precomputed tables. Reference: CompTIA Security+ SY0-701 course content and official CompTIA study resources.
A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?
johnes
13 hours ago