exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 58 discussion

Actual exam question from CompTIA's PT0-002
Question #: 58
Topic #: 1
[All PT0-002 Questions]

A penetration tester was able to gather MD5 hashes from a server and crack the hashes easily with rainbow tables.
Which of the following should be included as a recommendation in the remediation report?

  • A. Stronger algorithmic requirements
  • B. Access controls on the server
  • C. Encryption on the user passwords
  • D. A patch management program
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 1 year, 3 months ago
Selected Answer: A
The correct answer is A. Stronger algorithmic requirements. MD5 hashes are weaker than other hashing algorithms, such as SHA-256, which are much more difficult to crack with rainbow tables. Therefore, the penetration tester should recommend that the server use a stronger algorithm to hash passwords, such as SHA-256. This will ensure that passwords remain secure and cannot be easily cracked using rainbow tables. Option B is incorrect because access controls are related to user authentication, not hashing algorithms. Option C is incorrect because encryption is used to secure data in transit, not to secure user passwords. Option D is incorrect because patch management programs are related to updating software, not to the security of user passwords.
upvoted 12 times
...
rangertau
Highly Voted 1 year, 7 months ago
Selected Answer: A
Upgrade to at least MD6 algo.
upvoted 6 times
...
Skater_Grace
Most Recent 6 months, 4 weeks ago
Selected Answer: A
A. Better hashing is needed.
upvoted 1 times
...
UseChatGPT
7 months, 3 weeks ago
Selected Answer: C
Some of y'all need to go back to school it is clearly C
upvoted 1 times
Skater_Grace
6 months, 4 weeks ago
Encryption is not required here. With passwords Hashing is involved.
upvoted 2 times
...
...
solutionz
9 months ago
Selected Answer: A
A. Stronger algorithmic requirements. This should include not only using a more robust hashing algorithm but also implementing salting, which would make rainbow table attacks infeasible.
upvoted 2 times
...
xviruz2kx
1 year, 1 month ago
The correct answer is C. Encryption on the user passwords. MD5 is a weak hashing algorithm that is vulnerable to rainbow table attacks. The fact that the penetration tester was able to easily crack the hashes indicates that the passwords were not properly encrypted. Therefore, a recommendation to include in the remediation report is to implement encryption on the user passwords to ensure that they are not easily cracked in the event of a security breach. While access controls on the server (B) and a patch management program (D) are important security measures, they are not directly related to the issue of weak password encryption. Stronger algorithmic requirements (A) may be important for other areas of security, but they are not a direct solution to the issue of weak password encryption.
upvoted 2 times
...
nickwen007
1 year, 1 month ago
The recommendation that should be included in the remediation report is C. Encryption on the user passwords. A rainbow table is a precomputed table for reversing cryptographic hash functions, which means that the MD5 hashes can easily be cracked. To avoid this vulnerability in the future, it is recommended that the user passwords be encrypted to prevent them from being vulnerable to rainbow table attacks.
upvoted 3 times
...
kenechi
1 year, 2 months ago
Selected Answer: A
A - Is the correct answer. MD5 is weak. So it is recommended to upgrade to a stronger algorithm like SHA-256.
upvoted 3 times
...
masso435
1 year, 5 months ago
Selected Answer: A
It is recommended to hash a password, not encrypt.
upvoted 4 times
...
petercorn
1 year, 6 months ago
Selected Answer: A
Yes MD5 is insecure and so is SHA-1, I recommend using SHA-256 if size of the digest is an issue.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago