Podcast
Questions and Answers
Which of the following is NOT a solution for securely storing passwords using hash functions?
Which of the following is NOT a solution for securely storing passwords using hash functions?
- Using salt to store hashed password in a database
- Direct storage of userid and password in a database table
- Storing plaintext password in a database (correct)
- Storing hashed password in a database
What is the risk associated with direct storage of userid and password in a database table?
What is the risk associated with direct storage of userid and password in a database table?
- If an attacker gains access to the database, they can only impersonate the user whose credentials they stole
- If an attacker gains access to the database, they can only view the user's credentials
- If an attacker gains access to the database, they can impersonate any user (correct)
- There is no risk associated with direct storage of userid and password in a database table
What is the issue with storing hashed password in a database without using salt?
What is the issue with storing hashed password in a database without using salt?
- There is no issue with storing hashed password in a database without using salt
- If an attacker gains access to the database, they can impersonate any user
- If an attacker gains access to the database, they can use precomputed lookup tables of hashes of frequently used passwords to find matches (correct)
- If an attacker gains access to the database, they can only view the user's credentials
What is the recommended solution for securely storing passwords using hash functions?
What is the recommended solution for securely storing passwords using hash functions?
What is a blockchain?
What is a blockchain?
What makes a blockchain immutable and secure?
What makes a blockchain immutable and secure?
What is a proof-of-work scheme?
What is a proof-of-work scheme?
What is the purpose of a nonce in proof-of-work schemes?
What is the purpose of a nonce in proof-of-work schemes?
What is the role of a miner in Bitcoin mining?
What is the role of a miner in Bitcoin mining?
What is the purpose of a proof-of-work nonce in anti-spam schemes?
What is the purpose of a proof-of-work nonce in anti-spam schemes?
What happens to emails without proof-of-work in anti-spam schemes?
What happens to emails without proof-of-work in anti-spam schemes?
What is the purpose of adjusting the required pattern of the hash code in proof-of-work schemes?
What is the purpose of adjusting the required pattern of the hash code in proof-of-work schemes?
Which of the following is a risk associated with storing user credentials directly in a database table?
Which of the following is a risk associated with storing user credentials directly in a database table?
What is the recommended solution for securely storing passwords using hash functions?
What is the recommended solution for securely storing passwords using hash functions?
What is the purpose of a salt in password storage using hash functions?
What is the purpose of a salt in password storage using hash functions?
What is a blockchain?
What is a blockchain?
What is the difference between permissionless and permissioned blockchain?
What is the difference between permissionless and permissioned blockchain?
What is the purpose of proof-of-work in Bitcoin and anti-spam systems?
What is the purpose of proof-of-work in Bitcoin and anti-spam systems?
What is the role of a miner in Bitcoin mining?
What is the role of a miner in Bitcoin mining?
What is the purpose of a nonce in proof-of-work schemes?
What is the purpose of a nonce in proof-of-work schemes?
What happens if an email sender does not provide a proof-of-work nonce in anti-spam schemes?
What happens if an email sender does not provide a proof-of-work nonce in anti-spam schemes?
What is the purpose of adjusting the required pattern of the hash code in proof-of-work schemes?
What is the purpose of adjusting the required pattern of the hash code in proof-of-work schemes?
What is the difference between direct storage and storing hashed password in password storage using hash functions?
What is the difference between direct storage and storing hashed password in password storage using hash functions?
What is the purpose of a distributed ledger in blockchain technology?
What is the purpose of a distributed ledger in blockchain technology?
What are the different levels of knowledge an attacker can have when trying to break a cipher?
What are the different levels of knowledge an attacker can have when trying to break a cipher?
What does it mean to 'break' a cryptosystem?
What does it mean to 'break' a cryptosystem?
Does obtaining some partial information about the plaintext/key count as 'breaking' the cryptosystem?
Does obtaining some partial information about the plaintext/key count as 'breaking' the cryptosystem?
What is computational security?
What is computational security?
What is unconditional security?
What is unconditional security?
What is perfect secrecy?
What is perfect secrecy?
What is provable security?
What is provable security?
For which type of cryptography are there security proofs?
For which type of cryptography are there security proofs?
Is there provable security for symmetric cryptography?
Is there provable security for symmetric cryptography?
What do the other ciphers in use today have in terms of security?
What do the other ciphers in use today have in terms of security?
What is the one-time pad?
What is the one-time pad?
Why is the one-time pad not used in practice?
Why is the one-time pad not used in practice?
Flashcards are hidden until you start studying