CS 446 Test 2
If you set up write access in a Samba configuration file, the create mask = 0700 directive sets up read and write permissions for the user owner of new files. A. True B. False
A. True
In the shadow password suite, the /etc/gshadow file may store a hashed password for a group. A. True B. false
A. True
The chmod command changes file ownership in Linux. A. True B. False
B. False
samba
The Linux implementation of Microsoft networking. Current Linux systems can share directories and printers on a Microsoft-based network. It's even possible to have a Samba-based network of nothing but Linux computers.
In the shadow password suite, the /etc/group file contains basic information for each group account. A. True B. False
A. True
Red Hat uses the Linux unified key setup (LUKS) disk-encryption specification. A. True B. False
A. True
The sg command allows a user to join a group on a temporary basis. A. True B. False
A. True
Which mounting option enables user quotas on a filesytem? A. usrquota B. enable quotas C. edquota D. rw
A. usrquota
Which filesystem is a good candidate for mounting in read-only mode? A. /tmp/ B. /var/ C. /root/ D. /boot/
D. /boot/
Symetric Encryption
same key to encrypt and decrypt (AES-256)
The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG). A. True B. False
A. True
The set user ID (SUID) bit is a special permission that allows others to execute a given file with the rights of the user owner of the file. A. True B. False
A. True
Configuring a user account policy with minimum password length, maximum days for using a password, and various user logins can be performed by editing the ________ file. A. /etc/passwd B. /etc/login.defs C. /etc/shadow D. /etc/gshadow
B. /etc/login.defs
In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP). A. True B. False
A. True
In the password shadow suite, the difference between /etc/shadow and /etc/gshadow is that with /etc/gshadow, passwords are rarely configured. A. True B. False
A. True
In the user private group scheme, Linux users are typically assigned to at least one group, which is based on that user's account. A. True B. False
A. True
Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. A. True B. False
A. True
Log files that record login attempts and login failures classify log messages as auth and authpriv. A. True B. False
A. True
Pluggable authentication modules (PAM) allows users to be authenticated with local password stores and by way of network authentication, using facilities like Network Information Service (NIS) and the Lightweight Directory Access Protocol (LDAP). A. True B. False
A. True
You are encrypting a file with GPG and want to confirm the creation of a private and public key pair. Which command do you run? A. gpg --list-keys B. gpg --gen-key C. gpg -keys D. gpg: keyring
A. gpg --list-keys
An executable file with the _________ allows other users to run that command, with the permissions assigned to that user owner. A. set user ID (SUID) bit B. Set Group ID Bit (SGID) bit C. sticky bit D. Set Group ID Bit (SGID) and the sticky bit
A. set user ID (SUID) bit
Which directive do you add or enable in the Samba configuration file to prohibit access to the [homes] share by anyone other than the owner? A. valid users = %S B. write list = @admin C. create mask = 0700 D. directory mask = 0700
A. valid users = %S
Which directory renders many applications unusable, including logging into the graphical user interface (GUI), if the space allocated to the /tmp/ filesystem is full? A. /etc/ B. /tmp/ C. /bin/ D. /var/
B. /tmp/
In Linux, a volume is a way to segment a drive and a partition is a single entity that can be formatted with a filesystem. A. True B. False
B. False
In the filesystem hierarchy standard (FHS), the top-level root directory (indicated by the forward slash [/]), is never mounted separately. A. True B. False
B. False
Pluggable authentication modules (PAM) solves administrative permission problems by providing higher-level functions without having the whole program gain administrative access. A. True B. False
B. False
The fdisk command encrypts files in Linux. A. True B. False
B. False
The latest versions of Linux use the syslogd and klogd service daemons to configure logging for services and the kernel. A. True B. False
B. False
The /usr/ directory contains programs that are generally accessible to all users. This directory can be secured by mounting it ______. A. as read-write B. as read-only C. as SWAP type D. remotely
B. as read-only
You set up an FTP server and configured it to allow users to access their home directories. Which directive should you also include in the configuration file for security purposes? A. local_enable = YES B. chroot_local_user = YES C. anonymous_enable=NO D. chroot_local_user = NO
B. chroot_local_user = YES
Linux unified key setup (LUKS) is a specification for ________. A. mounting filesystems B. disk encryption C. mounting remote services D. linux kernels
B. disk encryption
You can configure the /boot/ directory as a separate filesystem. A. True B. False
A. True
What is a valid reason for setting up the /home/ directory as a separate filesystem? A. You can upgrade the distribution at a later date with little risk to user files. B. It makes the system easier to boot. C. It reduces the number of variables associated with user accounts. D. It automatically creates a redundant array of independent disks (RAID) array.
A. You can upgrade the distribution at a later date with little risk to user files.
Console kit packages, such as polkit, contain three primary commands. Which of the following is NOT included? A. ck-permissions B. ck-history C. ck-list-sessions D. ck-launch-session
A. ck-permissions
Which Linux filesystem format does not include any type of journaling? A. ext2 B. ext3 C. ext4 D. xfs
A. ext2
Hashing/Digest
One way encryption no "decryption", use on passwords and pin numbers and generated for a file (SHA 256), Md5
du command
disk usage, shows sizes and directories of all files
dig website.com
domain information
How do you tar a directory named src into a file named backup.tar?
tar -cvf backup.tar src
Free
view memory stats
Vmstat
virtual memory
Which file is used to configure the various mounting options of a filesystem upon boot? A. /etc/mount B. /etc/fstab C. /var/filesystem D. /boot/config
B. /etc/fstab
Which Linux partition type is used for standard partitions with data? A. 82 B. 83 C. 85 D. fd
B. 83
How would you grant read and execute permissions to all for a file named data3.txt?
chmod a+rx data3.txt
How would you grant read and write permissions to the group for a file named data1.txt?
chmod g+rw data1.txt
How would you revoke write and execute permissions from others for a file named data2.txt?
chmod o-wx data2.txt
nologin
fake shell
Whois domain.com
find out who owns domain
nslookup espy.com
find website ip address
A journaled filesystem keeps track of changes to be written to the filesystem. A. True B. False
A. True
Which directory does the filesystem hierarchy standard (FHS) recommend for locating configuration files? A. /etc/ B. /var/ C. /opt/ D. /usr/
A. /etc/
After configuring quotas on a Linux system, you can use the edquota command to edit the quota of a specific user. A. True B. False
A. True
Cron is a service for running administrative jobs on a regular basis. A. True B. False
A. True
Which of the following contains primarily administrative commands? A. /opt/ B. /mnt/ C. /sbin/ D. /media/
C. /sbin/
/var/
The /var/ directory includes log files and print spools. Some distributions use it for network service files.
mkdir
The command creates a directory.
How do you rename file3.txt to file4.txt?
mv file3.txt file4.txt
A polkit mechanism includes a subject, an object, and an action. Which of the following is the subject? A. An administrative tool B. The device to be modified C. The file to be modified D. The method for modifying the device or configuration file
A. An administrative tool
Which of the following is the best choice for network authentication? A. Lightweight Directory Access Protocol (LDAP) B. Network Information Service (NIS) C. polkit D. openssl
A. Lightweight Directory Access Protocol (LDAP)
What user account information can be found in the /etc/passwd file? A. The user's basic information, such as the default login shell B. The user's encrypted password C. Information on when the user last changed the password D. The user's sudo permissions
A. The user's basic information, such as the default login shell
In Linux, a mount point is a directory. A. True B. False
A. True
polkit
a way of solving administrative permission problems. When programs need to temporarily escalate privileges, the polkit is a framework for providing higher-level functions without having the whole program gain administrative access
traceroute website.com
print out ip addressees of packet routes
Top
real time task manager
Which command is used to delete an empty directory named dst?
rmdir dst
Asymetric
Two key (public and private key)-if message is encrypted with public key then it must be decrypted with matching private key, and vice versa. Ex: RSA/El-Gamal/ Diffe-Hellman
Which of the following commands is used to delete a directory and all the files within the directory? A) rm -i B) rmdir C) rm -r D) rm -v
C) rm -r
You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command to update and install packages. Which command do you run? A. %users ALL=/sbin/fdisk /mnt/sda, /bin/yum B. %users ALL=/tmp/fdisk /dev/sda, /usr/bin/yum C. %users ALL=/sbin/fdisk /dev/sda, /usr/bin/yum D. %users ALL=/tmp/fdisk /mnt/sda, /bin/yum
C. %users ALL=/sbin/fdisk /dev/sda, /usr/bin/yum
Which filesystem hierarchy standard (FHS) directory can be mounted separately from the root directory? A. /sbin/ B. /bin/ C. /home/ D. /etc/
C. /home/
As specified in the FHS, log files are generally found in the _____ directory. A. /home/ B. /root/ C. /var/ D. /etc/
C. /var/
Df -m
how many mb are being used in partitions
What might a large increase in the size of an authorization log file indicate? A. More frequently run user-based cron jobs only B. A large number of external login attempts only C. More frequently run user-based cron jobs or a large number of external login attempts D. Neither more frequently run user-based cron jobs nor a large number of external login attempts
C. More frequently run user-based cron jobs or a large number of external login attempts
Each line in a ____ configuration file is set up in the following format: module_type control_flag module_file (arguments) A. LDAP B. NIS C. PAM D. polkit
C. PAM
If a share on a Microsoft Windows host needs to mount on the Linux filesystem, which network service would typically be used? A. Network File System (NFS) B. Network Information Service (NIS) C. Samba D. Secure Shell (SSH)
C. Samba
Which command formats all Linux filesystems, Microsoft VFAT, and NTFS filesystems? A. format B. fdisk C. mkfs D. mount
C. mkfs
Which entry in the standard /etc/sudoers file gives the root administrative user full privileges through sudo? A. admin ALL=(ALL) ALL B. %admin ALL=(ALL) ALL C. root ALL=(ALL) ALL D. sys ALL=(ALL) ALL
C. root ALL=(ALL) ALL
Which of the following control flags used in pluggable authentication modules (PAM) approves user access assuming that there are no previous failures? A. required B. requisite C. sufficient D. allow
C. sufficient
Which command is used to display the lines at the beginning of a file? (A) begin (B) end (C) tail (D) head
D head
The GRUB configuration file is generally located in the ______ directory. A. /home/ B. /root/ C. /var/ D. /boot/
D. /boot/
With which directory is the sticky bit most commonly associated? A. /home B. /bin C. /sbin D. /tmp
D. /tmp, allows s any user to add files to and delete files from a specified directory. The most common use for the sticky bit is this directory