The <span> file that is used to determine which tty devices the root user is allowed to log in to is: </span><span>/etc/<span>securetty
</span></span>etc/securetty<span> is consulted by pam_securetty module in order to decide from which virtual terminals root is allowed to login from. You can limit the access to root account by </span>disabling root logins at the console by editing the /etc/securetty<span> file. </span>
Shshshshshshsjsjsjsjjsjdhdhhddhhd
A. IT professional, who maintains the network, must be added and removed from the network. - risk
B. Clients work independently; therefore, if one computer is not working, other computers can still do their jobs. - benefit (scalability is always a benefit)
C. Security levels are set up by individuals; therefore, these networks may not be as secure. - risk
D. There is no need for a big IT department to keep the network up and running. - benefit (it is simple for maintenance)
This is a just a guess, and this doesn't belong in this section but... Maybe hostile work environment?
It's details view. I hope this help.