<\/span><\/h3>\n\n\n\nThe identical password hashes will be generated if two users share the same password. In such a scenario, a dictionary or brute-force attack can be used to quickly crack the password. A salted hash is used to prevent this.<\/p>\n\n\n\n
A salted hash is one that adds or prefixes a random string (salt) to the password before hashing in order to randomize hashes. As a result, two entirely distinct hashes are generated, each of which can be used to defend the database users’ passwords from an attacker.<\/p>\n\n\n\n
<\/span>Q15 – What is phishing and how do you prevent it?<\/span><\/h3>\n\n\n\nIn phishing, an attacker acts as a reputable entity (a real person or business) in order to manipulate the victim and gain sensitive information. It can be done by requesting that the victim click on a harmful link or download a dangerous attachment in order to obtain private data including credit card numbers, usernames, passwords, and network credentials. Incorporating secure communication methods, such as utilizing video interview software<\/a>, can also help in verifying the identity of individuals and reducing the risk of falling victim to phishing attacks.<\/p>\n\n\n\nHere are some strategies for avoiding phishing:<\/strong><\/p>\n\n\n\n