In Linux, account security characteristics are controlled through the _____ file, which is normally available only to the system administrator.
A) /etc/shadow
B) /bin/shadow
C) /etc/hosts
D) /etc/passwd
Correct Answer:
Verified
Q46: Which of the following is a key
Q47: Is using the monitoring software that comes
Q48: Should security or system patches be installed
Q49: What port does DNS use?
A) 21
B) 23
C)
Q50: Q52: What port do Telnet applications use for Q53: Callback security is an example of _ Q54: Which organization was started by Coopers and Q55: Is the goal of disaster recovery to Q56:
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents