Domain 3 Question
A bad actor discovers that a certain hash gives him access to a couple of user accounts on a platform. The hash was obtained from the dark web. Which of the following is the BEST method to securely protect password hashes from such threats?
Use a salt with each password hash
Implement two-factor authentication (2FA)
Regularly rotate passwords
Use a key stretching algorithm
19 votes
3
6 comments
Samuel James
3
Domain 3 Question
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by