Which of the following controls can be implemented to prevent such unauthorized changes in the future?
Which of the following actions could have helped prevent the use of rainbow tables on the password hashes?