exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 95 discussion

Actual exam question from CompTIA's SY0-601
Question #: 95
Topic #: 1
[All SY0-601 Questions]

Against the recommendation of the IT security analyst, a company set all user passwords on a server as `P@55w0rD`. Upon review of the /etc/passwd file, an attacker found the following: alice:a8df3b6c4fd75f0617431fd248f35191df8d237f bob:2d250c5b2976b03d757f324ebd59340df96aa05e chris:ea981ec3285421d014108089f3f3f997ce0f4150
Which of the following BEST explains why the encrypted passwords do not match?

  • A. Perfect forward secrecy
  • B. Key stretching
  • C. Salting
  • D. Hashing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Boogie_79
Highly Voted 2 years, 8 months ago
Selected Answer: C
Salting refers to adding random data to the input of a hash function to guarantee a unique output. The set password, in this case, is already hashed so to further secure it salting is the next step in cryptography i.e. adding more security to the password. Think of it as "salt bae" making it just that much better.
upvoted 40 times
...
MorganB
Highly Voted 2 years ago
Passed my exam 27, April 23. This question was on my test.
upvoted 15 times
...
Protract8593
Most Recent 1 year, 9 months ago
Selected Answer: C
The reason the encrypted passwords do not match is due to the use of salting. In password hashing, salting involves adding a random value (the salt) to the password before hashing it. The salt value is unique for each user, which means even if two users have the same password, their hashed passwords will be different due to the different salt values. In the given scenario, the three encrypted passwords for Alice, Bob, and Chris do not match each other because each password is hashed with a different salt. This adds an extra layer of security and prevents attackers from easily identifying common passwords by looking at the hashed values.
upvoted 6 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: C
In password storage, salting is the practice of adding a random value (salt) to each password before hashing it. The salt is then stored alongside the hashed password. Salting enhances the security of stored passwords by introducing uniqueness to each password hash, even if two users have the same password. In the given scenario, the encrypted passwords do not match because each password has been salted before being hashed. This means that even though the original passwords were the same (P@55w0rD), the addition of a unique salt value resulted in different hashed representations for each user.
upvoted 3 times
...
mosher21
2 years ago
Selected Answer: C
Why not key stretching tho? It well can be key stretching too.
upvoted 3 times
...
MasterControlProgram
2 years, 1 month ago
Selected Answer: C
The encrypted passwords do not match because of "Salting." Salting is a technique that adds a random string of characters to a password before hashing it, so that even if two users have the same password, their encrypted passwords will be different. This makes it more difficult for attackers to use precomputed tables of hashes to crack passwords. In the given scenario, if salting was not used, all users would have the same password hash, making it easy for an attacker to gain unauthorized access to all accounts by cracking just one password.
upvoted 2 times
...
ApplebeesWaiter1122
2 years, 2 months ago
Selected Answer: C
C, salt
upvoted 1 times
...
DALLASCOWBOYS
2 years, 3 months ago
C. Salting. Salts eliminate the possibility that duplicate hashes are stored for different user accounts that have the same password.
upvoted 1 times
...
xxxdolorxxx
2 years, 3 months ago
Selected Answer: C
C all day long
upvoted 1 times
...
[Removed]
2 years, 3 months ago
salt A security countermeasure that mitigates the impact of a rainbow table attack by adding a random value to ("salting") each plaintext input
upvoted 1 times
...
Sklark
2 years, 6 months ago
Selected Answer: C
Haha I get that the question says "Against IT recommendations" but can you imagine a company actually setting everyone's passwords to the same password? There would be no least privilege or admin credentials. Haha anyways the example is testing to see why hash values of the same password would be different and that would be done by adding salt which is an arbitrary or mathematical extra something to the password to give it a different value when hashed.
upvoted 3 times
...
Libraboy
2 years, 6 months ago
Selected Answer: C
different passwords have different hashes but in this case, the same password is used and the only way to achieve different outcomes is by salting...adding random data to the password (same or not) when hashing to change the stored hash value.
upvoted 1 times
...
[Removed]
2 years, 8 months ago
I'm no expert, but I believe the hashed passwords are actually stored in etc/shadow. Anyways, it's salting.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago