Question 41

How do shadow passwords improve the password security in comparison to standard no-shadow password?
  • Question 42

    How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

    Question 43

    Which if the following tools, used for DNS debugging, reports not only the response from the name sever but also details about the query?
  • Question 44

    FILL BLANK
    Which file is processed by newaliases? (Specify the full name of the file, including path.)

    Question 45

    What is the purpose of the iconv command?