In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy? What happens to accounts with expired passwords?
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q17: A user account can be locked with
Q18: In order to create user accounts on
Q19: Logs from the cron daemon (crond) can
Q20: A system that uses an /etc/passwd file
Q21: _ represents a text description of the
Q23: On Linux, the root user always has
Q24: On a CUPS printing system, to remove
Q25: What configuration file contains parameters that set
Q26: A set of information that is sent
Q27: In the process called _, a user's
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents