A security administrator is working on a solution to protect passwords stored in a database against rainbow
table attacks. Which of the following should the administrator consider?
A. Hashing
B. Salting
C. Lightweight cryptography
D. Steganography
table attacks. Which of the following should the administrator consider?
A. Hashing
B. Salting
C. Lightweight cryptography
D. Steganography