Question 21
Why is the xhost program considered dangerous to use?
Question 22
Which of the following features are provided by SPICE? (Choose two.)
Question 23
A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file)
Question 24
What information related to a user account is modified using the chage command?
Question 25
Which of the following commands is used to rotate, compress, and mail system logs?