Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
You want to create a role to meet these requirements: * The role is to be protected from unauthorized usage * The password of the role is not to be embedded in the application source code or stored in
Which method would you use to restrict enabling of such roles?