CYSE270 Quiz 5
When using the john to crack the password, you need to have a file that contains which of the following entries?
/etc/shadow
Which of the following is not true regarding security principles?
External hackers try to compromise security by making a system deny access to unauthorized entities.
Which of the following description is correct about a hash function.
It is computationally infeasible to find two different inputs produce the same hash output.
How can a system administrator help avoid accidentally running commands that could destroy all system files?
Log in as a regular user and use the sudo or su command to gain temporary root access.
When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?
account security
When securing user accounts, which of the following components must be considered?
all of the above
Ideally, what characters should you use in a password to make it strong?
all of them above
I have a really strong password so I can use it among different systems for years. True or False?
false
How long would it take an attacker to crack a 10 character password?
it depends!
The goal in terms of __________ is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.
security