csci 4612 final
Which of the following is the best choice for network authentication?
Lightweight Directory Access Protocol (LDAP)
The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG).
True
Using the sudo command to issue command is typically safer than logging in as the root user.
True
Which filesystem is a good candidate for mounting in read-only mode?
/boot/
Which directory renders many applications unusable, including logging into the graphical user interface (GUI), if the space allocated to the /tmp/ filesystem is full?
/tmp/
The latest versions of Linux use the syslogd and klogd service daemons to configure logging for services and the kernel.
False
The ls -p command displays file and folder permissions.
False
If a share on a Microsoft Windows host needs to mount on the Linux filesystem, which network service would typically be used?
Samba
You run the encrypt-setup-private command to encrypt a user directory. What is one thing you are prompted to enter?
The login passphrase
A polkit mechanism includes a subject, an object, and an action. Which of the following is the subject?
An administrative tool
In the shadow password suite, the /etc/group file contains basic information for each group account.
True
What is a valid reason for setting up the /home/ directory as a separate filesystem?
You can upgrade the distribution at a later date with little risk to user files.
Which Linux filesystem format does not include any type of journaling?
ext2
The chmod command changes file ownership in Linux.
false
A rainbow table is a set of precomputed stored hashes that are mapped to a plaintext password.
true
What can a black-hat hacker use to decipher hashed passwords?
A rainbow table
Why is it recommended that you avoid using Network Information Service (NIS)?
NIS transmits data, including password hashes, over the network without encryption.
Cron is a service for running administrative jobs on a regular basis
True
In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP).
True
Regular Linux file and directory permissions are read, write, and traverse.
) False