Operating System Security is the fifth level in Introduction to Cyber Security, you can access the level from here.
Which of the following is not an operating system?
Which of the following is a strong password, in your opinion?
Based on the top 7 passwords, let’s try to find Johnny’s password. What is the password for the user
Once you are logged in as Johnny, use the command
history to check the commands that Johnny has typed. We expect Johnny to have mistakenly typed the
root password instead of a command. What is the root password?
While logged in as Johnny, use the command
su - root to switch to the
root account. Display the contents of the file
flag.txt in the
root directory. What is the content of the file?