212-77 C. The intruder could run a password-cracking program on the system's /etc/passwd file, thus obtaining all the user's passwords for use in further compromising the system at a later date. D. The intruder could utilize a bug in su, passwd, or some other SUID root program to acquire root privileges and then alter the system's configuration files. Answer: A, B QUESTION 47: Which command creates a file system in Linux? A. CRFS B. FS C. FDISK D. MKFS Answer: D QUESTION 48: What command would you type to change the ownership of somefile.txt from ralph to tony? QUESTION 49: Which of the following commands configures the laura account to expire on January 1, 2005?