Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

A) /etc/sysconfig B) /etc
C) /etc/shadow/passwd D) /etc/shadow


D

Computer Science & Information Technology

You might also like to view...

Which of the following is not a valid runtime description according to Big O notation?

a. O(1) b. O(n) c. O(n 2 ) d. All of the above are valid.

Computer Science & Information Technology

The null terminator stands for ASCII code

a. 57 b. 100 c. 1000 d. 0 e. None of these

Computer Science & Information Technology

Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.

A) geographic B) user C) growing D) topic

Computer Science & Information Technology

When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer

A) password B) captcha C) signature D) verification

Computer Science & Information Technology