Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 4 Question 36 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 36
Topic #: 4
[All CFR-210 Questions]

A file is discovered in the /etc directory of an internal server by an automated file integrity checker. A security analyst determines the file is a bash script. The contents are as follows:

---

#/bin/bash

IFS=:

[[-f/etc/passwd]] && cat/etc/passwd |

while read a b c d e f g

do

echo ''$e ($a)''

done

---

Which of the following was the author of the script attempting to gather?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Rene
1 months ago
Yo dawg, I heard you like usernames, so this script puts usernames in your usernames so you can see usernames while you see usernames. The answer is C) User's name and username, fo sho.
upvoted 0 times
...
Brande
1 months ago
This is a classic Linux privilege escalation attempt. The author is trying to gather the UID and GID, so the answer is D) UID and GID.
upvoted 0 times
Adria
3 days ago
B: I believe they were trying to get the UID and GID of users.
upvoted 0 times
...
Rosalind
18 days ago
A: That script looks suspicious. What do you think the author was trying to gather?
upvoted 0 times
...
...
Scarlet
2 months ago
Haha, this script is like a blast from the past! Trying to read the /etc/passwd file, how retro. The answer is definitely B) Username and password hash.
upvoted 0 times
Willow
5 hours ago
User 2: Definitely, it's trying to get username and password hash.
upvoted 0 times
...
Ranee
2 days ago
User 1: Yeah, that script is old school.
upvoted 0 times
...
Eura
3 days ago
User4: Classic way of trying to gather credentials.
upvoted 0 times
...
Carmen
5 days ago
User3: B) Username and password hash is the answer.
upvoted 0 times
...
Elroy
5 days ago
User 3: Classic way of trying to gather credentials.
upvoted 0 times
...
Gayla
8 days ago
User2: Yeah, it's trying to read the /etc/passwd file.
upvoted 0 times
...
Cory
8 days ago
User 2: Definitely, it's trying to get the username and password hash.
upvoted 0 times
...
Sang
15 days ago
User 1: Yeah, that script is old school.
upvoted 0 times
...
Gilma
1 months ago
User1: Haha, this script is so old school!
upvoted 0 times
...
...
Charlena
2 months ago
Hmm, the script is just printing the username (field 5) from the /etc/passwd file. So the correct answer must be C) User's name and username.
upvoted 0 times
...
Lourdes
2 months ago
This script is clearly trying to extract user information from the /etc/passwd file. The answer has to be B) Username and password hash.
upvoted 0 times
...
Hubert
3 months ago
I believe the correct answer is A) Home directory and shell, as the script is reading /etc/passwd file.
upvoted 0 times
...
Jina
3 months ago
I agree with Azzie, the script seems to be echoing the user's name and username.
upvoted 0 times
...
Azzie
3 months ago
I think the author was trying to gather user's name and username.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77