A Linux system has prohibited a user from logging on as root, even though this user knows the
root password on a Linux system. Which of the following systems has operated correctly?
A.
The /etc/nologin file
B.
The /etc/shadow file
C.
The Bourne Again Shell (BASH)
D.
Pluggable Authentication Modules (PAM)
Explanation: