A hacker has manage
d to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
A. The file reveals the passwords to the root user only.
B. The password file does not contain the passwords themselves.
C. He cannot read it because it is
encrypted.
D. He can open it and read the user ids and corresponding passwords.