RedHat RH133 Question Answer
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. The company is using the host-based access control to avoid unwanted access of the malicious users. John wants to add a new user, which can use X applications from the remote computer. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.