CYSE270 Quiz 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When using the john to crack the password, you need to have a file that contains which of the following entries?

/etc/shadow

Which of the following is not true regarding security principles?

External hackers try to compromise security by making a system deny access to unauthorized entities.

Which of the following description is correct about a hash function.

It is computationally infeasible to find two different inputs produce the same hash output.

How can a system administrator help avoid accidentally running commands that could destroy all system files?

Log in as a regular user and use the sudo or su command to gain temporary root access.

When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?

account security

When securing user accounts, which of the following components must be considered?

all of the above

Ideally, what characters should you use in a password to make it strong?

all of them above

I have a really strong password so I can use it among different systems for years. True or False?

false

How long would it take an attacker to crack a 10 character password?

it depends!

The goal in terms of __________ is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.

security


Ensembles d'études connexes

EVS 113- Chapter 4 Review Questions

View Set

S2 Physiology Unit 2 - Body Fluid Physiology

View Set

Mod 2: DNA & RNA Structure quiz+ Wksht 1 + quiz 1(45min)

View Set

Macroeconomics Discussion/ True&False Questions (13,14,15)

View Set

Chapter 06: Values, Ethics, and Advocacy

View Set