A shadow password file is a(n) ________.
a) imitation password file used by the system to trick malicious users
b) false password file that is placed on a system by a malicious user
c) password file that is accessible only by users with root privileges
d) deleted password file that is still stored in memory
c) password file that is accessible only by users with root privileges
You might also like to view...
Which of the following statements is false?
a. Some event-listener interfaces are functional interfaces. b. For such interfaces as mentioned in (a), you can implement event handlers with lambdas. c. For a simple event handler, a lambda significantly reduces the amount of code you need to write. d. All of the above are true.
A(n) _____ is an attack that takes advantage of a vulnerability.
A. proxy B. exploit C. firewall D. archive
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for her small business. She wants the added protection so the computer will not crash due to a memory error. ? What type of RAM should you consider purchasing?
A. Unbuffered B. Buffered C. ECC D. Registered
Which of the following is NOT a type of graphic?
A. Video B. Chart C. Photograph D. WordArt