In order to improve your system’s security you decide to implement shadow passwords. What command should you use?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Linux Commands Interview Questions

What is the command to change from /etc/passwd file to /etc/shadow file?

4 Answers  


What is difference between free and available memory in linux?

0 Answers  


what is the UID and GID of root user? Can a normal user can change the ownership of a file? what is the command to change ownership of a file?

9 Answers   HCL, IPsoft,


What is umask 000?

0 Answers  


what is a command to display top 10 users who are using Huge Space?

3 Answers   IBM, TNS,






I have Laptop. I want to assign DHCP ip address, but in my Laptop having Wireless and with wire NIC cards, it is possible to assign reserve ip address for both NIC card, but same host name?

4 Answers   AOL,


how do find all failed login attempts via ssh?

8 Answers   TCL,


What can you type at a command line to determine which shell you are using?

6 Answers   Tech Mahindra,


What are the examples of simple command?

0 Answers  


What does mkdir do in linux?

0 Answers  


What is chainloading?

4 Answers  


How do I get to root directory in linux?

0 Answers  


Categories