exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 13 discussion

Actual exam question from CompTIA's SY0-601
Question #: 13
Topic #: 1
[All SY0-601 Questions]

Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?

  • A. Hashing
  • B. Tokenization
  • C. Masking
  • D. Encryption
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ribeiro19
Highly Voted 8 months, 2 weeks ago
Selected Answer: A
Hashing, is the answer. Why? Because, with Hashing the tool can identify a credential without knowing the exact credential , by a mathematical method (ex: multiply the credential by a number, and all different credentials have different results). comparing the Hashing of the local credential with the Hashing of the web credentials the tool can extrapolate if the credential was compromised.
upvoted 29 times
...
Protract8593
Highly Voted 8 months, 2 weeks ago
Selected Answer: A
Hashing is a cryptographic technique that takes input data (in this case, passwords) and converts it into a fixed-size string of characters, which is the hash value. The hashing process is one-way, meaning it is not feasible to reverse the hash and obtain the original password from the hash value alone. When monitoring tools need to compare values (such as passwords) to detect password leaks, they can hash the values and then compare the resulting hash values against a known database of leaked or compromised password hashes. If the hash of the user's password matches any entry in the database, it indicates that the password has been compromised without actually revealing the original password itself. This approach is widely used in password security practices, especially in situations where it's essential to protect the actual credentials from exposure. In conclusion, the most suitable option for a monitoring tool to compare values (passwords) and detect password leaks without providing the actual credentials is A. Hashing.
upvoted 6 times
...
russian
Most Recent 1 year, 1 month ago
Selected Answer: A
"compare values and detect password leaks without providing the ACTUAL CREDENTIALS"
upvoted 1 times
...
lsalc
1 year, 5 months ago
i answered A on the test
upvoted 2 times
...
kennyboy23
1 year, 6 months ago
Security engineer just put a fence around the property. But I'm the property grounds keeper. And I'm trying to break into the R&D building. And his fence did zero to keep me out since I was already authorized to be on the property.
upvoted 1 times
...
DirtyDann
1 year, 6 months ago
Selected Answer: A
A. Hashing and all that goes along with it
upvoted 2 times
...
AbdullxHanan
1 year, 10 months ago
Selected Answer: A
hashing is corect
upvoted 2 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: A
Hashing is a one-way mathematical function that takes an input (in this case, passwords) and produces a fixed-size string of characters, known as a hash value or hash code. The important property of hashing is that it is computationally infeasible to reverse-engineer the original input from the hash value
upvoted 1 times
...
DALLASCOWBOYS
2 years, 4 months ago
A. Hashing
upvoted 2 times
...
Deeppain90
2 years, 4 months ago
Selected Answer: A
Hashing
upvoted 1 times
...
xxxdolorxxx
2 years, 4 months ago
Selected Answer: A
A makes the most sense to me.
upvoted 1 times
...
FMMIR
2 years, 6 months ago
Selected Answer: A
Because, with Hashing the tool can identify a credential without knowing the exact credential, by a mathematical method (ex: multiply the credential by a number, and all different credentials have different results). comparing the Hashing of the local credential with the Hashing of the web credentials the tool can extrapolate if the credential was compromised.
upvoted 2 times
...
okay123
2 years, 6 months ago
"Hashing is used to assure the authenticity of websites with which they may share personal and private information, in password storage applications (personal or used by entities they interact with online), and is likely used by the antivirus solution they trust to keep their devices free of malware." So if Hashing is used to validate the integrity of data, you can compare hashes to figure out if the data (password or whatever it is) was compromised https://www.uscybersecurity.net/csmag/what-the-hash-data-integrity-and-authenticity-in-american-jurisprudence/
upvoted 1 times
...
Sultan1990
2 years, 9 months ago
i thinks C.
upvoted 1 times
Sultan1990
2 years, 9 months ago
sorry A is answer
upvoted 6 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...