COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Hashing ____
A
Changes data before it reaches the spreadsheet records to be compared to
B
Never stores sensitive data as plain text
C
Is not very secure
D
Stop hackers being able to see data and they will only see the hash values
Explanation: 

Detailed explanation-1: -Hashing helps to prevent file tampering or analyze file tampering by making it easy to identify each file. Since each file generates a hash value stored with the file data, any changes made to the file appear in the hash value.

Detailed explanation-2: -Data can be compared to a hash value to determine its integrity. Usually, data is hashed at a certain time and the hash value is protected in some way. At a later time, the data can be hashed again and compared to the protected value. If the hash values match, the data has not been altered.

Detailed explanation-3: -In computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user’s password, instead of requiring the associated plaintext password as is normally the case.

Detailed explanation-4: -Hashing is a one-way function where data is mapped to a fixed-length value. Hashing is primarily used for authentication. Salting is an additional step during hashing, typically seen in association to hashed passwords, that adds an additional value to the end of the password that changes the hash value produced.

There is 1 question to complete.