How do shadow passwords improve the password security in comparison to standard no-shadow password?
A. Regular users do not have access to the password hashes of shadow passwords.
B. Every shadow password is valid for 45 days and must be changed afterwards.
C. The system’s host key is used to encrypt all shadow passwords.
D. Shadow passwords are always combined with a public key that has to match the user’s private key.
E. Shadow passwords are stored in plain text and can be checked for weak passwords.