In order to improve your system’s security you decide to implement shadow passwords. What command should you use?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Linux Commands Interview Questions

Does linux cp command overwrite?

0 Answers  


What is cat command in linux?

0 Answers  


who invented unix?

3 Answers   Wipro,


What is the command can be run to remove all the rules in an iptable table?

0 Answers  


How does diff command work?

0 Answers  






Did you ever write any inerface files / profile file to support unix environment setup ?

1 Answers   HP,


How do I list all processes in linux?

0 Answers  


what is ldd?

7 Answers   IBM, Magnum, TCS, Tech Mahindra,


What does chmod 755 do?

0 Answers  


My linux machine is crashed due to root file system, I need not to bother about the root file system, but i need to take care of /etc, /usr, like that.,, can i recover these file systems?

2 Answers  


in unix how to change old name to new name

7 Answers   Google,


Where can I find bash in linux?

0 Answers  


Categories