They are at odds over what types of encryption are used to secure Linux passwords.(Choose all that apply.
How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?