Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is an efficient way to securely store passwords?
Home
Secure Code Review
Which of the following is an efficient way to securely store passwords?
0
votes
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
recategorized
Mar 16, 2021
by
rajeshsharma
Which of the following is an efficient way to securely store passwords?
i) Encryption
ii) Hashing
iii) Abstraction
#password-security
secure-code-review
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is ii) Hashing
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-security
secure-code-review
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: Which of the following type of metrics do not involve subjective context but are material facts?
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
absolute-metrics
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
0
votes
Q: The account used to make the database connection must have ______ privilege.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
database-connection
database-privilege
0
votes
Q: __________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-size
secure-code-review
code-review
size-code
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
0
votes
Q: Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#parameterized-store
secure-code-review
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
...