problem 1:
How is dictionary attacks made complicated against UNIX systems? Which file is instrumental in preventing dictionary attack altogether?
problem 2:
Which database recovery methods provide an exact, up-to-date copy of database maintained at an alternative location?
problem 3:
What combination of backup strategies offers the fastest backup creation time?
problem 4:
Given that a file in the UNIX has the 9 mode bits set as follow: 111 110 100, illustrate the access rights encoded.
problem 5:
What is the main difference between virus and worm?