Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
When an attacker acquires the shadow file of a Linux system, what will the attacker find? Choose the best answer
Usernames and passwords
Usernames and hashed passwords
System credentials
The shadow file of a Linux system stores all the usernames in plain text and passwords in encryption format.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.