What is one way that hackers try to break Linux security?

What will be an ideal response?

A hacker might try to break security by trying to obtain your password or get a copy of the
password file that is not shadowed and write a program to compare encrypted results to the
contents of the password file.

Computer Science & Information Technology

You might also like to view...

MC Which of the following correctly defines a class Baseball and inherits from class Sport?

a) class Baseball ( Sport ):. b) class Baseball : Sport :. c) class Sport.Baseball:. d) None of the above.

Computer Science & Information Technology

____ is similar to availability but it measures the probability that a unit will not fail during a given time period.

A. Response likelihood B. Reliability C. Scalability D. Operability

Computer Science & Information Technology