What action, if any, should you take?

You’ve been reviewing your security checklist and one of the items calls for reviewing the
/etc/passwd file. You cat the file and notice that, while most users have an x in the second column, a few have a 14 character string in the second column. What
action, if any, should you take?

You’ve been reviewing your security checklist and one of the items calls for reviewing the
/etc/passwd file. You cat the file and notice that, while most users have an x in the second column, a few have a 14 character string in the second column. What
action, if any, should you take?

A.
No action. The users with an x have their accounts locked.

B.
Run pwconv to convert the unix passwords to shadow passwords.

C.
Use the passwd program to give the users with the hashed passwords new passwords.

D.
Use the passwd program to give the users with the x new passwords.

E.
No action. Linux knows how to handle the situation and allow user logins.



Leave a Reply 0

Your email address will not be published. Required fields are marked *