In Unix, which file is required for you to set up an environment such that every user on the other host is a trusted user that can log into this host without
authentication?
A. /etc/shadow
B. /etc/
C. /etc/passwd
D. None of the choices.