Question 21

Why is the xhost program considered dangerous to use?
  • Question 22

    Which of the following features are provided by SPICE? (Choose two.)
  • Question 23

    A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file)

    Question 24

    What information related to a user account is modified using the chage command?
  • Question 25

    Which of the following commands is used to rotate, compress, and mail system logs?