UNIX Exam 2 Review 2A
UNIX users______.
(All of the above), may be a member of a single group, may belong to multiple groups, ay be added or removed from groups only by the system administrator.
When using vi, _________ will find a line beginning with the word: "Yes"?
/^Yes/
What is the result of the following command? mkfifo -m 600 newfifo
Create a new FIFO: newfifo with read and write permissions for the owner only.
The execution of the umask command without argument____.
Displays the current mask value
Why is issuing the command umask 000 a bad idea?
It grants unlimited access to all new files and directories.
____________ is not a manner of discovering a UNIX user's password?
Look it up in the password file.
After the chmod a-rw sample command has been executed_____.
Nobody (except the superuser) can read or write sample
The command: chmod 75 sample ______.
None of the above
What does the following command do?"sort 2> sort.error 0< students 1> students.sorted"
Only the first two are correct.
What types of files are candidates for having the execution access permissions set for users______?
Programs and script files.
The root user has the authority to______.
all of the above
The command: _________, takes away all privileges from the group users
chmod 600 sample
Which of the following commands will remove all access permissions to file sample for the group and others?
chmod go= sample
For the file with the name: solid, which of the following is not a valid use of the chmod command?
chmod solid +read
The command: wc can be used to_____.
display the number of lines in a file....It can be used to do any of the three or all three.
UNIX provides three mechanisms to protect files. These mechanisms include_______.
encryption, password protection, and access privileges.
Regular expressions allow the user to:
specify a set of items by using a single character string.
When the _____________ is set for a program, the system tries to keep the executable code for the program in memory or the swap space after it finishes.
sticky bit
The set-user-ID bit (SUID) allows an executable file to______.
take on the privileges of the owner of the file when it executes.
The standard output and standard input of UNIX commands are in the form of:
text
What command will allow a user to see the value of the bit mask used to set default file permissions for new files?
umask
What command allows a user to set the file access permissions for all new executable files and directories to read for all users with the owner given write and execute permissions as well?
umask 033
File access permissions are grouped into the categories_____.
user, group, and others.
If a UNIX system allows passwords to be made up of digits, lowercase and uppercase letters; and must contain at least 8 characters; how many possible passwords are possible?
62 to the power of 8
A file whose owner has read, write, and execute permissions has file permissions equivalent to an octal value of_____.
7
A UNIX system administrator is_____.
AOTA
A UNIX user's password________.
AOTA
A permission value of 764 for the sample file means that_____.
AOTA
A file with the following permissions: -rwxr-xr-x
All is correct.
The output of the command: ls -l produces information about each file in the working directory including______.
All of the above
When a file is encrypted it_______.
makes a file unreadable and indecipherable unless given the encryption key.
For a directory, users granted read and execute permissions are allowed to_________.
read the directory's contents.
File access permissions include:
read, write, and execute.
What types of files are candidates for having the execution access permissions set for users?
script files.
When a user is given execute permission for a directory, he/she may_______.
search it.
What is the result of the following command? chmod 700 *
sets access privileges for all files to read, write, and execute for the owner.