On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______.
A.
-rw-r—–, -r——–
B.
-rw-r–r–, -r–r–r–
C.
-rw-r–r–, -r——–
D.
-rw-r–rw-, -r—–r–
E.
-rw——–, -r——-
On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______.
On a system using shadowed passwords, the correct permissions for /etc/passwd are ____- and the correct permission for /etc/shadow are _______.
A.
-rw-r—–, -r——–
B.
-rw-r–r–, -r–r–r–
C.
-rw-r–r–, -r——–
D.
-rw-r–rw-, -r—–r–
E.
-rw——–, -r——-