A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the
password is hashed. This technique is known as:
A.
symmetric cryptography.
B.
private key cryptography.
C.
salting.
D.
rainbow tables.
Explanation: