Refer to the Exhibit. [root@server1 ~ # 1s -1 /usr/bin/passwd -r-x—x—x 1 root root 21200
oct 7 21:01 /usr/bin/passwd [root@server1 ~] # 1s -1 /etc/shadow -r – – – – – – – – 1 root root
1818 Mar 7 10:31 /etc/shadow] [root@server1 ~]# A user smith is on your system
complained that he is not able to change his password. As the administrator, you long-listed
the passwd command and the /etc/shadow file. View the Exhibit that shows the output.
What must you do to enable this user to change his password?
A.
Set SUID on /usr/bin/passwd.
B.
Set permission on /etc/shadow to 600.
C.
Set sticky bit on /usr/bin/passwd.
D.
Set SGID on /usr/bin/passwd.
E.
Set read and write permission for others on /etc/shadow.
B
I’ve found multiple sites that state the permissions of the /etc/shadow files should be read/write only for the root user.
This site specifically states only the root user should have read permissions to /etc/shadow and /etc/passwd
https://docs.oracle.com/cd/E37670_01/E36387/html/ol_localauth_sec.html
A:
https://www.aiotestking.com/oracle/what-would-you-do-to-enable-smith-to-change-his-password-2/
A