John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. The company is using the
host-based access control to avoid unwanted access of the malicious users. John wants to add a
new user, which can use X applications from the remote computer. Which of the following
commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
A.
John will run thexhost command.
B.
John will execute thestartx command.
C.
John will add a new user in the file /etc/Xn.hosts.
D.
John will add a new user in the file /etc/Xadd.hosts.