Identify the sample of system components observed.
For each sampled system component, describe how the observed password files verify that passwords are unreadable during:
i. Transmission
ii. Storage
For each sampled system component, describe how the observed system configuration settings verify that strong cryptography is used for passwords during:
i. Transmission
ii. Storage