Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam GPEN topic 1 question 30 discussion

Actual exam question from GIAC's GPEN
Question #: 30
Topic #: 1
[All GPEN Questions]

How can a non-privileged user on a Unix system determine if shadow passwords are being used?

  • A. Read /etc/password and look for "x" or "II" in the second colon-delimited field
  • B. Read /etc/shadow and look for "x" or "II" in the second colon-delimited field
  • C. Verify that /etc/password has been replaced with /etc/shadow
  • D. Read /etc/shadow and look NULL values In the second comma delimited field
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Omo_Mushin
1 year, 11 months ago
Normally A would be correct - but reading further, there are other arguments that says B is very possible.. https://superuser.com/questions/1391307/how-could-a-hacker-access-the-etc-shadow-file-if-it-is-only-accessible-by-root https://unix.stackexchange.com/questions/90929/why-have-programs-like-su-access-to-etc-shadow
upvoted 1 times
...
devnull
2 years, 1 month ago
Selected Answer: A
The correct answer is A. non-privileged users cannot read /etc/shadow.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...