On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are ___.
A. -rw-r—–, -r——–
B. -rw-r–r–, -r–r–r–
C. -rw-r–r–, -r——–
D. -rw-r–rw-, -r—–r–
E. -rw——-, -r——–
On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are ___.
A. -rw-r—–, -r——–
B. -rw-r–r–, -r–r–r–
C. -rw-r–r–, -r——–
D. -rw-r–rw-, -r—–r–
E. -rw——-, -r——–