Unix II: Chapter 3 "Access Control and Rootly Powers" "STUDY GUIDE"

¡Supera tus tareas y exámenes ahora con Quizwiz!

UNIX/Linux systems interpret ____ to mean the parent directory. .. backward slash (\) forward slash (/) .

.. (2 dots/2 periods)

Pseduo-users also have their shells set to: (Check all that apply) /bin/nologin /bin/false /bin/bash /bin/ksh

/bin/nologin /bin/false

What configuration file typically contains a list of groups and associated accounts associated with a group? /var/group /etc/group /bin/group /usr/groups

/etc/group

What two files on the Unix/Linux systems contain usernames and their passwords. /etc/usernames /etc/passwd /etc/passwords /etc/shadow

/etc/passwd /etc/shadow

Which file stores protected passwords for accounts? /etc/passwords /etc/shadow /etc/users /etc/accounts

/etc/shadow

When sudo is run, which file is consulted and lists the perople who are authorized to use sudo and the commands they are allowed to run on each host? /etc/sudofile /etc/sudo.conf /etc/sudo.config /etc/sudoers

/etc/sudoers

A _________ gives a group of users equal access files that they all share. UID AID PID GID

GID

________ also deals with authentication similiar to PAM, but uses a specific authentication method; unlike PAM which is a framework. Kerberos PAM Keyboard Stravos

Kerberos

SELinux utilizes an access control system in which all permissions are assigned by administrators and called: Access Control Mandatory Access Control Seccurity Access Control Role-based Access Control

Mandatory Access Control

In the Unix/Linux Operating System permissions on a files and directories consist of: (Ex... rwxrwxrwx (Check All that Apply) Other Group Policies Owner or User

Other Group Owner or User

What is a piece of software (or a combination of software and hardware) that stores passwords for your organizatino in a secure fashion. Secure Hold Password Keeper Password Vault Local Keep

Password Vault

What technology is an authentication technology rather than an access control technology? Pluggable Authentication Systems (PAS) Role-based Access Control (RBAC) Pluggable Authentication Modules (PAM) Mandatory Access Control (MAC)

Pluggable Authentication Modules (PAM)

What model assigns intermediate roles to assigned users instead of direct permissions. User-based access control (UBAC) Role-based access control (RBAC) Role-based Permission Control (RBPC) User-based Permission Control (UBPC)

Role-based access control (RBAC)

To navigate the UNIX/Linux directory structure, you use the ____ command. cd jump mv nav

cd

What command changes the root directory of a process? chown chmod chroot chproc

chroot

What is the most important characteristic of a good password? length secure easy common

length

What command is used to determine the ownership of a file? rm filename ls -l filename mv filename list -l filename

ls -l filename

What command do you use to delete files in Unix/Linux? rm cp mv del

rm

For security reasons, most Unix/Linux systems allow _________ logins to be disabled on terminals through network access, except on the main console. service user group root

root

What account on a Unix System is known as the "superuser" account? sudo admin root superuser

root

Special User Acconts, also known as Pseudo-users,, have their password replaced in the /etc/shaow file with a _________ so that their accounts cannot be logged in to. star (*) blank pound (#) exclamation (!)

star (*)

What account substitues the user identity, effectively allowing you to login as that user account. su - username sudo - username login - username log - username

su - username

What program can be utilized to allow a user specific commands to be run as a different user, without giving full access to the users account. For example, the ability to cat a file that "root" owns. su root runas sudo

sudo

What tricks can subvert the usage of sudo? (Check all that Apply) sudo sudo sudo /bin/sh Shell Escapes sudo su

sudo /bin/sh Shell Escapes sudo su


Conjuntos de estudio relacionados

Exam 3 Musculoskeletal Test Bank

View Set

Module 10 Lesson 1 PPT : Chapter 19: Combining SAS® Data Sets

View Set

Chapter 6 - Operant Conditioning: Introduction - Quiz

View Set

ACCTG 302 Midterm Purple Questions

View Set

Grade 6 - Social Studies - Chapter 3 - Section 4

View Set