Which of the following files stores information about failed logins on a Linux system?
A. /var/log/btmp
B. /var/log/wtmp
C. /var/log/nolo
D. /var/log/failed
Answer: A
You might also like to view...
When you use parallel arrays, two or more arrays contain ____ data.
A. connected B. equivalent C. identical D. related
What devices do you need to consider when counting devices in your network that need IP addresses
What will be an ideal response?
After you right-click a slide in the thumbnails pane in Normal view or in Slide Sorter view to open a shortcut menu, which of the following commands do you click to create a copy of the slide?
What will be an ideal response?
Answer the following statements true (T) or false (F)
1. A program can use the operations of the ADT stack without knowing how the operations are implemented. 2. In an array based implementation of a stack, the stack can grow and shrink dynamically. 3. In the link based implementation of the stack, both the method push and the copy constructor allocate new nodes. 4. Private data members are hidden from the client. 5. A class need not validate data given by client code. According to the author, the client code should do that.