Essay
Describe how the /etc/passwd and /etc/shadow files are used in the authentication process. Why are two files used instead of one? How can you convert a system to use the /etc/shadow file to store passwords?
Correct Answer:

Verified
The system database that contains user a...View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q18: On Linux, the root user always has
Q19: What configuration file contains parameters that set
Q20: On most Linux systems, the logrotate utility
Q21: Match each correct item with the statement
Q22: How do you delete a user account?
Q24: In the process called _, a user's
Q25: Match each correct item with the statement
Q26: The secure log file contains information regarding
Q27: The CUPS Web administration tool can be
Q28: What two log files below will show