The administrator notices malicious network traffic from the example.com domain and would like to contact the example.com administrator. Which of the following commands would display contact information for this domain?
A company currently has four Linux servers and wants to install a fifth server to perform user authentication. Which of the following is a valid protocol for centralized user authentication?