Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-501 topic 1 question 69 discussion

Actual exam question from CompTIA's SY0-501
Question #: 69
Topic #: 1
[All SY0-501 Questions]

Which of the following cryptographic attacks would salting of passwords render ineffective?

  • A. Brute force
  • B. Dictionary
  • C. Rainbow tables
  • D. Birthday
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ales
Highly Voted 4 years, 6 months ago
C Rainbow tables Password Salting Password salting is the process of securing password hashes from something called a ***Rainbow Table attack***. The problem with non-salted passwords is that they do not have a property that is unique to themselves – that is, if someone had a precomputed rainbow table of common password hashes, they could easily compare them to a database and see who had used which common password. A rainbow table is a pre-generated list of hash inputs to outputs, to quickly be able to look up an input (in this case, a password), from its hash. However, a rainbow table attack is only possible because the output of a hash function is always the same with the same input. So how do we make each hashed password in a database unique? We add something called a salt to the input to the hash function. A salt is basically some random data that is unique to each user, that is saved with their password and used in the hashing process of both storing and verifying the password.
upvoted 11 times
...
Abner89
Highly Voted 4 years, 11 months ago
it's Rainbow
upvoted 6 times
...
Freddie26
Most Recent 2 years, 12 months ago
Salt makes the rainbow go away.
upvoted 2 times
...
henry76
3 years, 11 months ago
Rainbow: The Rainbow method uses password and precomputed hash. If you have Password + salting, there is no way to recover the password using precomputed hash since it gets only the password not the password + salting
upvoted 2 times
...
DaddyP
4 years, 3 months ago
According to Gibson's book, it states that "Both using salting techniques to increase the complexity of passwords and thwart brute force and rainbow attacks."
upvoted 2 times
MagicianRecon
3 years, 10 months ago
Would not classify brute force a cryptographic attack
upvoted 1 times
...
...
a1037040
4 years, 6 months ago
C. Rainbow Tables per Professor Messer: "Rainbow tables wont work with Salted Hashes"
upvoted 5 times
...
MSZ
4 years, 11 months ago
Rainbow
upvoted 3 times
...
Abner89
4 years, 11 months ago
A public salt does two things: makes it more time-consuming to crack a large list of passwords, and makes it infeasible to use a rainbow table.
upvoted 2 times
...
andev08
5 years ago
B. Dictionary
upvoted 5 times
Funkydave
3 years ago
this needs down voted
upvoted 4 times
Dion79
2 years, 11 months ago
Yes it does Dave. Some come here to help you fail and some come to help you pass. Who can you trust.....
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...