1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
8

Which file is used to determine which tty devices the root user is allowed to log in to?

Computers and Technology
1 answer:
aleksley [76]3 years ago
7 0
The <span> file that is used to determine which tty devices the root user is allowed to log in to is: </span><span>/etc/<span>securetty
</span></span>etc/securetty<span> is consulted by pam_securetty module in order to decide from which virtual terminals root is allowed to login from. You can limit the access to root account by </span>disabling root logins at the console by editing the /etc/securetty<span> file. </span>
You might be interested in
"what is the #1 resource used when researching a product online?"
BARSIC [14]
I believe it would be customer reviews.
6 0
3 years ago
What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
polet [3.4K]

Answer:

Type of Business/entity and User Location are True.

User Intent and your judgment are False.

Explanation:

The following are the factors that treated at the time of deciding the following business is based on the too far query and the location of the user. So, That's why the first two factors are applied by the type of business or entity and the location of the user but the last two factors are not applied because it is not about the user, it is related to the firm or the business.

7 0
3 years ago
What process combines data from a list with the content of a document to provide personalized documentsWhat
Morgarella [4.7K]
Mail merge can combine data with the content of a document to make personalized documents.
6 0
3 years ago
Read 2 more answers
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was
Firlakuza [10]

Answer

Dispose of absorbents as hazardous waste in its own hazardous waste container

Explanation

Hazardous waste is a waste that has chemical composition and properties which makes it capable of causing illness, death  or harm to humans and other life forms when released to the environment without proper management. The characteristics of such wastes include: toxic, ecotoxic, infectious substance, poisonous, explosive and flammability. Hazardous wastes can be destroyed by incineration, chemical process, and temporary on-site waste storage facilities such as waste piles and lagoons/ponds



8 0
4 years ago
Read 2 more answers
Other questions:
  • In database systems, the dbms enforces rules about which user can perform which action when. The rules are known as ________.
    10·1 answer
  • Where should fire extinguishers be stored on a boat?
    7·1 answer
  • You are doing research for a current event report on smartphone technology. You do a web search for information that includes se
    5·2 answers
  • g Create your own data file consisting of integer, double or String values. Create your own unique Java application to read all
    7·1 answer
  • Does anyone know the answer to 2 and 3
    6·1 answer
  • Which of the following best meets the requirements of a strong password?
    5·2 answers
  • What does FLUX do when soldering an electrical joint?
    13·2 answers
  • A program is
    7·1 answer
  • Question # 2
    6·1 answer
  • Using the _____, you can direct the browser to retrieve specific information about the URL, to reload the current page, or to lo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!