Question 17401 – NTA UGC NET Dec 2023 Paper-2
March 22, 2024NTA UGC NET Dec 2023 Paper-2
March 22, 2024NTA UGC NET Dec 2023 Paper-2
Question 50 |
In Linux, where is the user password stored?
/etc/password | |
/root/password | |
/etc/passwd | |
/root/passwd |
Question 50 Explanation:
/etc/passwd file:
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
Correct Answer: C
Question 50 Explanation:
/etc/passwd file:
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
Contains basic user account information, including usernames, user IDs (UIDs), group IDs (GIDs), home directories, and default shells.
Password field: While this file used to store encrypted passwords directly, it now typically contains a placeholder character (x) or a special token (!) to indicate that passwords are stored separately.
/etc/shadow file:
Stores actual encrypted passwords, along with password aging and expiration information.
Only accessible to root or users with elevated privileges, enhancing security.
Password hashing:
Linux uses one-way hashing functions to store passwords, making them irreversible.
When a user enters their password, it’s hashed and compared to the stored hash in /etc/shadow. If they match, authentication is successful.
Key points:
Security: Separating password information into /etc/passwd and /etc/shadow improves security by restricting access to sensitive password data.
Permissions: /etc/passwd is typically world-readable, while /etc/shadow is only readable by root or those with specific permissions.
Hashing: Hashing prevents raw passwords from being stored, making it harder for attackers to recover them even if they gain access to the system.
Subscribe
Login
0 Comments