Which of the following is a weakness of applications such as Tripwire that create a database of hashes?
Which of the following describes the function of a Pluggable Authentication Module (PAM) on a Linux system?