Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Lab – Compare Data with a Hash

 Click the Calculate button. What is the value next to MD5? 82E8AC8D4AE929C79E1CE4CF1F0691F4
 Click the Calculate button in HashCalc again.What is the value next to MD5?
FC51502A1DE4CFA835A8BA6A47603AD9
 Is the value different from the value recorded in Step 3? Yes.
 Notice that many of the hash types create a hash of a different length. Why? Due to difference in
number of bits used to produce the hash.

Lab – Create and Store Strong Passwords


The password must be at least 8 characters long.
The password must contain upper- and lower-case letters.
The password must contain a number.
The password must contain a non-alphanumeric character.
 Take a moment to analyze the characteristics of a strong password and the common password policy set
shown above. Why does the policy set neglect the first two items? Explain.
The policy does not address memorability of password or ease of guessing, and assumes that
users will adopt passwords that meet the password requirements while still being easy to
memorize.
 Generate the password. Is the password generated easy to remember?
 Generate a random word password by clicking Generate Another! at the top portion of the webpage. Is
the password generated easy to remember?
 As you add passwords to Lastpass, where are the passwords stored?
 Besides you, at least one other entity has access to your passwords. Who is that entity?
 While having all your passwords stored on the same place can be convenient, there are drawbacks. Can
you think of any?

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 1 www.netacad.com

You might also like