Linux Users and Groups
c. adduser joe
A new employee has come into the company, how do I set up an account for him using one command? Group of answer choices: a. useradd joe b. makeuser joe c. adduser joe d. newusers joe
b. User passwords are not stored on the system I will give you a temporary password?
A user calls and asks to get their linux password, after verifying their credentials, what would be the best response? Group of answer choices: a. Let me check the passwd file b. User passwords are not stored on the system I will give you a temporary password? c. I will create a new account for you d. Let me look in the shadow file
c. owner, group, and others
After the command chmod 755 foo who has permissions to run the script foo? Group of answer choices: a. just the group and others b. no one has permission to run the script c. owner, group, and others d. just the owner
b. sudo passwd alice
Alice has forgotten her password, how could her password be reset? Group of answer choices: a. sudo fuser alice b. sudo passwd alice c. sudo reset -passwd alice d. sudo password alice
a. doJ
An encrypted password file contains the following information joe:$1$doJ$k9CHHAQJZLsGyso06priq.:15721:0:99999:7::: What is the salt? Group of answer choices: a. doJ b. 1 c. $1$doJ$k9CHHAQJZLsGyso06priq. d. k9CHHAQJZLsGyso06priq.
e. chown fred *
Fred has taken over for Bill at work and so all Bill's files need to be given to Fred. What command would transfer control of the files to Fred. Group of answer choices: a. xfer * fred b. chown bill fred c. chown * fred d. xfer bill fred e. chown fred * f. adduser fred bill
d. id
I am a new Linux and Unix system user. How do I find out the user and groups names and numeric IDs of the current user or any users on my server? Group of answer choices: a. findid b. whoami c. finger d. id
c. give fred a home directory
I have run the commands: sudo useradd fred sudo passwd fred so fred has a password and a valid login name. Do I need to do something else? Group of answer choices: a. fred needs to sign a EULA b. Add a startup script for fred c. give fred a home directory d. fred should be able to login now
a. True
I have the following entry in the shadow file: joe:$1$doJ$k9CHHAQJZLsGyso06priq.:15721:0:99999:7::: has joe's password hash been salted? Group of answer choices: a. True b. False
a. vipw -s
I need to edit the shadow file which commands should I use Group of answer choices: a. vipw -s b. nano passwd c. vipw -shadow d. sudo passwd
a. sudo adduser ben sudo
I need to give ben sudo privileges so I want to add ben to the sudo group. What command would I use? Group of answer choices a. sudo adduser ben sudo b. sudo addgroup ben sudo c. sudo adduser sudo ben d. sudo addgroup sudo ben
d. /etc/passwd
In which of the following files is the user's default login shell specified? Group of answer choices: a. /etc/group b. /etc/shadow c. /bin/shells d. /etc/passwd
d. roles
Modern access control links groups of individuals such as everyone in IT1510 or all students together by what they need to do and access in the company. What are these grouping called? Group of answer choices: a. groups b. jobs c. sudo d. roles
sudo visudo
New backup technicians have been hired. What commands could be used to give them root privileges to a limited set of backup commands? sudo visudo sudo chmod +s dump sudo sudoers sudo passwd
c. If partitions are added or removed it may change the names of the other device files in the system.
On a Linux system the file system table file usually uses UUIDs of partitions rather than the representation of the partition as a device file. What is the reason that UUIDs are preferred? Group of answer choices: a. The UUID is a block device. b. The UUID is shorter. c. If partitions are added or removed it may change the names of the other device files in the system. d. The device file is a block device.
c. chgrp admin adminSetup; chmod g+xwr
The admin group needs to be able to execute and change the adminSetup script. Which commands would work to do this Group of answer choices: a. chgrp admin adminSetup; chmod 456 b. chgrp admin adminSetup; chmod 666 c. chgrp admin adminSetup; chmod g+xwr d. chgrp adminSetup admin; chmod g+xwr
b. To hold the encrypted user passwords.
The purpose of the /etc/shadow file is . Group of answer choices: a. To shadow the use of the sudo command. b. To hold the encrypted user passwords. c. All are correct d. To serve as a backup of the fstab file.
/etc/passwd
This is a snippet from which file: root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh joe:x:1000:1000:Joe User,,,:/home/joe:/bin/bash /etc/shadow /etc/init.d /etc/rc.0 /etc/passwd
chfn
What 4 letter command allows a user to change their GECOS information?
c. chage
What command could I use to cause passwords to expire earlier? Group of answer choices: a. passage b. change c. chage d. passwdage
b. cut -d: -f1,7 /etc/passwd
What command will generate a list of user names from /etc/passwd along with their login shell? Group of answer choices: a. colrm 1,7 /etc/passwd b. cut -d: -f1,7 /etc/passwd c. column -s : 1,7 /etc/passwd d. chop -c 1,7 /etc/passwd
d. ACL
What gives Linux multiple users and groups? Group of answer choices: a. File systems access b. system support groups c. not possible with Linux d. ACL
d. The password becomes invalid which disables password based logins although other login methods remain usable.
What happens if the password of a user in the /etc/shadow file is prepended with the ! character? Group of answer choices: a. The user is disabled and all login methods, including but not limited to password based logins, are disabled. b. The password is inverted which allows the user to log in with any password other than the current password. c. When logging in, the user automatically gets root privileges in addition to his regular privileges. d. The password becomes invalid which disables password based logins although other login methods remain usable. e. Upon the next log in, the user is forced to change his password.
c. chfn
What is the command to change GECOS information? Group of answer choices: a. sudo passwd b. chGECOS c. chfn d. chpw
a. Groups may have a password that allows users to join that group temporarily.: e. Each user may be a member of several groups. However, only one group is the user's primary group.
What is true about groups in a Linux system? (Choose TWO correct answers.) Group of answer choices: a. Groups may have a password that allows users to join that group temporarily. b. Each user can only be a member of one group at a time. c. Groups can be nested meaning that one group can be a member of another group. d. Group memberships are optional such that there may be users that do not belong to any group. e. Each user may be a member of several groups. However, only one group is the user's primary group.
a. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.
What is true regarding the file ~/.forward? Group of answer choices: a. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient. b. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command. c. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses. d. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.
c. Role based access control
What type of access control usually consists of moving people into or out of groups andassigning or removing permissions for groups? Group of answer choices: a. Group access control b. Simple access control systems c. Role based access control d. Physical access control systems (PACS)
b. /etc/shadow
Where are the password hashes stored in linux? Group of answer choices: a. /etc/password b. /etc/shadow c. /etc/hidden d. /etc/passwd
/etc/shadow
Where do I look for the shadow file /etc/shadow /root/shadow /dev/shadow /shadow
a. /etc/passwd
Where would the list of all login users be found? Group of answer choices: a. /etc/passwd b. /etc/users c. /var/spool/usrs d. /etc/logins
groupadd
Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)
b. ulimit
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes? Group of answer choices: a. quota b. ulimit c. edquota d. core
sudo adduser jane developers
Which command will add user jane to the group developers? chgrp jane developers sudo adduser jane developers All are correct sudo vigroup
d. sudo deluser jane
Which command will remove the account named janefrom the system? Group of answer choices: a. All are correct b. sudo deleteuser jane c. sudo userdelete jane d. sudo deluser jane
sudo delgroup developers
Which command will remove the group named developers from the system? All are correct sudo groupdelete developers sudo deletegroup developers sudo delgroup developers
a. passwd; d. usermod; e. chage
Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) Group of answer choices: a. passwd b. chsh c. chattr d. usermod e. chage
a. Passwords are not stored in linux but I can reset your password.
Which is the best response to the following question: Can you look up my password on the Linux system and give it to me? Group of answer choices: a. Passwords are not stored in linux but I can reset your password. b. Sure tell me your account name c. Passwords are stored in the shadow file let me look d. I don't have permissions to do that
chown dan:staff file.txt
Which of the following commands changes the ownership of file.txt to the user dan and the group staff? chown dan:staff file.txt chown dan -g staff file.txt chown dan/staff file.txt chown -u dan -g staff file.txt
sudo vipw
Which of the following commands should an administrator use to edit the /etc/passwd file directly? vi /etc/passwd sudo more /etc/passwd sudo vi /etc/passwd sudo vipw
d. Files and directories owned by the user are deleted.
Which of the following does NOT happen when a user account is removed from the system? Group of answer choices: a. The user account can no longer login. b. The user account data is removed from the /etc/passwd file. c. The user account is removed from any groups to which it belongs. d. Files and directories owned by the user are deleted.
Download a file from the internet
Which of the following does not require root privileges? Shutting down the system Create device files Download a file from the internet Set clock Change ownership of files
b. user password
Which of the following information is NOT found in the /etc/passwd file? Group of answer choices a. home directory b. user password c. user name d. default shell
c. UUID
Which of the following is not found in the passwd file Group of answer choices: a. login shell b. UID c. UUID d. GECOS
c. passwd file
Which of the following will not provide single sign-on services? Group of answer choices: a. Netware Directory Services b. Open LDAP c. passwd file d. Active Directory
d. adduser
Which of these is not a step to manually add a user Group of answer choices: a. Edit the passwd file b. Policy agreement c. Use chown on home directory d. adduser
passwords must be longer than 8 characters
Which rule would help the most for keeping passwords secure? password must not include the user name passwords must be longer than 8 characters password must include a symbol paswords must include at least 1 number
They are reserved and used for system accounts.
Which statement is true about User ID numbers 0-99 in debian based Linux They are normal user accounts. They are reserved and used for system accounts. Numbers below 100 are not valid UIDs. They are used for system users not allocated by the debian project.
c. sudo passwd fred
fred needs his password fixed what command should I use to reset his password? Group of answer choices: a. sudo fixpass fred b. password fred c. sudo passwd fred d. sudo password fred
d. hash codes
what is hidden in /etc/shadow a. passwords b. decriptors c. system files d. hash codes