1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
8

Which file is used to determine which tty devices the root user is allowed to log in to?

Computers and Technology
1 answer:
aleksley [76]3 years ago
7 0
The <span> file that is used to determine which tty devices the root user is allowed to log in to is: </span><span>/etc/<span>securetty
</span></span>etc/securetty<span> is consulted by pam_securetty module in order to decide from which virtual terminals root is allowed to login from. You can limit the access to root account by </span>disabling root logins at the console by editing the /etc/securetty<span> file. </span>
You might be interested in
A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
Inessa05 [86]

Answer: low security

Explanation:

While internet is a platform to share information and use various network over to internet for communication, the security of the network is a big issue these days. Since the university wants to install a client-server network.

It has to take care of the low-security issue as the data with which they will be dealing is a very sensitive data which includes information of students and their families, upcoming policies, financial transaction. Hence the university should no compromise on low security.

3 0
3 years ago
If you are going to develop a special computer, what would it be and explain it's purpose.​
Ann [662]

Answer:

It would be to figure out what cancers someone could exactly so no need for a biopsy

4 0
3 years ago
What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
Liula [17]
<span>The answer would be "Validation of electronic signatures"</span>
3 0
3 years ago
Read 2 more answers
Which best described most television in the 1940s and 1950s? color cable 24 hour black and white
Semenov [28]

Answer:

The answer is "black and white".

Explanation:

During this period of live TV output in the United States, from the late 1940s to late 1950, the era between the 1940s and 1950s is often regarded as the first Golden Age of Television.  

It is the monochrome broadcast tv signal transmission and reception system. At the end of the 1940s, in 50 major cities, there were 98 commercial tv channels. TV sets costs also reduced by 1949.

8 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Other questions:
  • What does GPA mean? Please tell me!
    13·2 answers
  • Create a program asks a user for an odd positive integer. If the user gives and even number or a number that is negative it prom
    7·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • Error: 404 Not Found <br>The resource that you requested does not exist on this server.
    14·2 answers
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    7·1 answer
  • Create a python code with 5 circles, 5 polygons, 5 line commands, 2 for loops, and 1 global variable
    12·1 answer
  • How does one award the brainliest???? will give brainliest.
    8·2 answers
  • One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You
    10·2 answers
  • Place a check next to each of the choices that describe an example of proper ergonomics. (more than 1 answer)
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!