On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___
and the most correct permissions for /etc/shadow are ___.
A.
-rw-r—–, -r——–
B.
-rw-r–r–, -r–r–r–
C.
-rw-r–r–, -r——–
D.
-rw-r–rw-, -r—–r–
E.
-rw——-, -r——–
On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___
and the most correct permissions for /etc/shadow are ___.
On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___
and the most correct permissions for /etc/shadow are ___.
A.
-rw-r—–, -r——–
B.
-rw-r–r–, -r–r–r–
C.
-rw-r–r–, -r——–
D.
-rw-r–rw-, -r—–r–
E.
-rw——-, -r——–