A software developer wants to prevent stored passwords from being easily decrypted. When
the password is stored by the application, additional text is added to each password before
the password is hashed. This technique is known as:
A.
symmetric cryptography.
B.
private key cryptography.
C.
salting.
D.
rainbow tables.