Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?
A) /etc/sysconfig B) /etc
C) /etc/shadow/passwd D) /etc/shadow
D
Computer Science & Information Technology
You might also like to view...
Which of the following is not a valid runtime description according to Big O notation?
a. O(1) b. O(n) c. O(n 2 ) d. All of the above are valid.
Computer Science & Information Technology
The null terminator stands for ASCII code
a. 57 b. 100 c. 1000 d. 0 e. None of these
Computer Science & Information Technology
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.
A) geographic B) user C) growing D) topic
Computer Science & Information Technology
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer
A) password B) captcha C) signature D) verification
Computer Science & Information Technology