You inadvertently change the permission block on /usr/bin/passwd command to
-r-xr-xr-x.
What would be the effect of this change?
Which of the following measures is the most effective way to prevent attacks through various network services?
server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP Wrappers runs?
A computer is chained firmly to the wall, all of its accounts are secured with good shadowed passwords, and it's configured to boot only from its hard disk, but the system has no BIOS or boot loader password. No users are currently logged into this system. How might a malicious individual without an account on this system corrupt it if given a few minutes alone with it? (Choose two)
You've installed a new application on a test computer. During testing, you've run into a number of problems that you are unable to troubleshoot. Where should you look first for help?
You're planning the setup of a Linux computer as a server on your organization's network. Which of the following is consistent with best practices for documentation?
You think that someone has been attempting to hack into your system by attacking your /etc/passwd file. What can you do to increase the security of your system?
What is the name of the file that contains encrypted hashes of passwords on a Linux system?