CYSE 270--Security Policy &
Password Cracking with 100%
correct answers(100%
accuracy)
Which of the following description is correct about a hash function. -
answer It is computationally infeasible to find two different inputs produce
the same hash output.
When using the john to crack password, you need to havae a file that
contains which of the following entries? - answer /etc/shadow
I have a really strong password do I can use it among different systems for
years. True or False? - answer False
The goal in terms of ___________ is to make systems, services, and data
available to the correct entities while denying access to these resources
by unauthorized entities. - answer security
How can a system administrator help avoid accidentally running
commands that could destroy all system files? - answer Log in as a regular
user and use the sudo or su command to gain temporary root access.
Ideally, what characters should you use in a password to make it strong? -
answer Letters & Numbers only,
Mixed Case (Upper & Lower) Characters
Special Characters
****All of the above****
When securing user accounts, which of the following components must be
considered? - answer Ensuring accounts are not susceptible to attack
Password Cracking with 100%
correct answers(100%
accuracy)
Which of the following description is correct about a hash function. -
answer It is computationally infeasible to find two different inputs produce
the same hash output.
When using the john to crack password, you need to havae a file that
contains which of the following entries? - answer /etc/shadow
I have a really strong password do I can use it among different systems for
years. True or False? - answer False
The goal in terms of ___________ is to make systems, services, and data
available to the correct entities while denying access to these resources
by unauthorized entities. - answer security
How can a system administrator help avoid accidentally running
commands that could destroy all system files? - answer Log in as a regular
user and use the sudo or su command to gain temporary root access.
Ideally, what characters should you use in a password to make it strong? -
answer Letters & Numbers only,
Mixed Case (Upper & Lower) Characters
Special Characters
****All of the above****
When securing user accounts, which of the following components must be
considered? - answer Ensuring accounts are not susceptible to attack