...
Question 17401 – NTA UGC NET Dec 2023 Paper-2
March 22, 2024
NTA UGC NET Dec 2023 Paper-2
March 22, 2024
Question 17401 – NTA UGC NET Dec 2023 Paper-2
March 22, 2024
NTA UGC NET Dec 2023 Paper-2
March 22, 2024

NTA UGC NET Dec 2023 Paper-2

Question 50
In Linux, where is the user password stored?
A
/etc/password
B
/root/password
C
/etc/passwd
D
/root/passwd
Question 50 Explanation: 
/etc/passwd file:
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
Correct Answer: C
Question 50 Explanation: 
/etc/passwd file:
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
error: Alert: Content selection is disabled!!