8.Which one of the following passwords is least likely to be compromised during a dictionary attack?
A.mike
B.elppa
C.dayorange
D.dlayna
9.What file is instrumental in preventing dictionary attacks against Unix systems?
A./etc/passwd
B./etc/shadow
C./etc/security
D./etc/pwlog
10.Which one of the following tools can be used to launch a distributed denial of service attack
against a system or network?
A.Satan
B.Saint
C.Trinoo
D.Nmap
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here