In order to improve your system’s security you decide to implement shadow passwords. What command should you use?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Linux Commands Interview Questions

Why do we use cmake?

0 Answers  


What is cmake in linux?

0 Answers  


what is first RHEL 5.x version support ext4 filesystem?

2 Answers  


Explain Backup Managment commands in Linux.

5 Answers  


Which command is used to find what is in your home directory?

0 Answers  


Who is unix command?

0 Answers  


What is Write Command?

3 Answers  


What are grep patterns called?

0 Answers  


Write a cron entry for the following scenario:- At 10:30 AM for every Sunday of every 1st month of a quarter.

7 Answers   HP, IBM,


How can I check the exit status of my previous command in Linux operating system?

0 Answers   SwanSoft Technologies,


What signal is ctrl c?

0 Answers  


Who am I command in linux?

0 Answers  


Categories