Which of the following is a weakness of applications such as Tripwire that create a database of hashes?
Which of the following is a weakness of applications such as Tripwire that create a database of
hashes?
Which of the following helps simplify access control lists in Windows 2003 systems?
Which of the following helps simplify access control lists in Windows 2003 systems?
Which of the following permissions can you use to accomplish this goal?
You want to disable a user’s ability to execute an application within a specific folder in a Windows
2003 system. Which of the following permissions can you use to accomplish this goal?
Which of the following is a common behavior of a root kit?
Which of the following is a common behavior of a root kit?
Which command will allow you to do this?
You are a standard user on a Linux system. You want to set permissions on the /etc/shadow file
so that it cannot be modified by any user. Which command will allow you to do this?
Which of the following is a common step for securing SSH-based transmissions?
Which of the following is a common step for securing SSH-based transmissions?
Which of the following is an accurate statement about this change in the system?
You want to configure your system so that members of the wheel group can become root without
having to provide a password first. Which of the following is an accurate statement about this
change in the system?
Which of the following describes the function of a Pluggable Authentication Module (PAM) on a Linux system?
Which of the following describes the function of a Pluggable Authentication Module (PAM) on a
Linux system?