Question 1:
How is dictionary attacks made complicated against UNIX systems? Which file is instrumental in preventing dictionary attack altogether?
Question 2:
Which database recovery methods provide an exact, up-to-date copy of database maintained at an alternative location?
Question 3:
What combination of backup strategies offers the fastest backup creation time?
Question 4:
Given that a file in the UNIX has the 9 mode bits set as follow: 111 110 100, illustrate the access rights encoded.
Question 5:
What is the main difference between virus and worm?