Pass the ECCouncil E-Commerce Architect 212-77 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You add the following line to the /etc/passwd file mary12250Mary Jones/home/mary/bin/bash a

and use the passwd command to change her password. You also create her home directory. However, when Mary tries to log in, the login fails. What is the problem?

Options:

A.

You did not assign a valid password to Mary's account.


B.

You did not set the appropriate permissions to her home directory.


C.

You did not create her home directory.


D.

You cannot create a new user account by manually editing the /etc/passwd file.


Expert Solution
Questions # 12:

Which of the following are risks of SUID and SGID programs? (Choose two)

Options:

A.

Bugs in the programs may cause more damage than they would in ordinary programs.


B.

The program files are large and thus may cause a disk to run out of space.


C.

Because the programs require password entry, running them over an insecure network link runs the risk of password interception.


D.

Users may be able to abuse a program's features, thus doing more damage than would otherwise be possible.


Expert Solution
Questions # 13:

Which of the following is an advantage of designating one well-protected computer to record log files for several other computers?

Options:

A.

You can log information to a separate computer that you can't log locally.


B.

Logging information in this way minimizes network use.


C.

The logging system can analyze the logs using Tripwire.


D.

Logs stored on a separate computer are less likely to be compromised by a cracker.


Expert Solution
Questions # 14:

You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?

Options:

A.

end


B.

CTRL-ALT-DEL


C.

stop


D.

wait


E.

kill


Expert Solution
Questions # 15:

How should you engage users in helping to secure your computer's passwords?

Options:

A.

Educate them about the importance of security, the means of choosing good passwords, and the ways crackers can obtain passwords.


B.

Instruct your users to e-mail copies of their passwords to themselves on other systems

so that they're readily available in case of an emergency


C.

Enforce password change rules but don't tell users how crackers obtain passwords since you could be educating a future cracker.


D.

Give some of your users copies of the encrypted database file as backup in case a cracker breaks in and corrupts the original.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions