in Technology by

Which of the following is most suitable to secure passwords?

  

(1)Non-repudiation

(2)Encryption

(3)Authorization

(4)Authentication

1 Answer

0 votes
by
Answer:-(2)Encryption

Related questions

0 votes
    The most suitable reagent for the following conversion is H3C-C≡C-CH3→ A. Hg2+/H+,H2O B. Na/liquid NH3 C. H2,Pd/C quinoline D. Zn/HCl Select the correct answer from above options...
asked Jan 2, 2022 in Education by JackTerrance
0 votes
    Which of the following is an efficient way to securely store passwords? (1)Abstraction (2)Hashing (3)Encryption...
asked May 17, 2021 in General by JackTerrance
0 votes
    Which of the following options are measures to secure backup data? (1)All the options (2)Implementing security ... awareness (4)Use of cyber security software (5)Encryption...
asked Jun 1, 2021 in Technology by JackTerrance
0 votes
    Which of the following laws created a favorable environment for women to secure freedom and selfdevelopment? (a) Right to ... ) None of the above Please answer the above question....
asked Aug 14, 2022 in Education by JackTerrance
0 votes
    Which of the following is the port number for SSH (Secure Shell)? (a) 20 (b) 21 (c) 22 (d) 23 I got ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A solution to enhance security of passwords stored as hashes. (1)Encryption (2)Using digital signatures (3)Salting (4)Noncing...
asked May 15, 2021 in Technology by JackTerrance
0 votes
    If you had enabled a Conditional Access Policy for External Users using multi-factor authentication, and then also ... users, would they trigger both when accessing content?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    Where are SQL Server user names and passwords stored in SQL Server?...
asked Nov 9, 2020 in Technology by Editorial Staff
0 votes
    Identify the correct statement in the following in secure programming questions Answers Please select the correct options ... weakness (d)Logic bomb is an unintentional weakness....
asked Dec 11, 2020 in Education by Editorial Staff
0 votes
    Currently I am working in dev env on my local machine where I am storing passwords in plain text using ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 6, 2022 in Education by JackTerrance
0 votes
0 votes
    MegaHackerZ helps crackers to crack email passwords. (a) True (b) False This question was posed to me in ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    There are ________ major types of passwords. (a) 4 (b) 5 (c) 6 (d) 7 I got this question in ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim's ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...