Unix II: Chapter 3 "Access Control and Rootly Powers" "STUDY GUIDE"
UNIX/Linux systems interpret ____ to mean the parent directory. .. backward slash (\) forward slash (/) .
.. (2 dots/2 periods)
Pseduo-users also have their shells set to: (Check all that apply) /bin/nologin /bin/false /bin/bash /bin/ksh
/bin/nologin /bin/false
What configuration file typically contains a list of groups and associated accounts associated with a group? /var/group /etc/group /bin/group /usr/groups
/etc/group
What two files on the Unix/Linux systems contain usernames and their passwords. /etc/usernames /etc/passwd /etc/passwords /etc/shadow
/etc/passwd /etc/shadow
Which file stores protected passwords for accounts? /etc/passwords /etc/shadow /etc/users /etc/accounts
/etc/shadow
When sudo is run, which file is consulted and lists the perople who are authorized to use sudo and the commands they are allowed to run on each host? /etc/sudofile /etc/sudo.conf /etc/sudo.config /etc/sudoers
/etc/sudoers
A _________ gives a group of users equal access files that they all share. UID AID PID GID
GID
________ also deals with authentication similiar to PAM, but uses a specific authentication method; unlike PAM which is a framework. Kerberos PAM Keyboard Stravos
Kerberos
SELinux utilizes an access control system in which all permissions are assigned by administrators and called: Access Control Mandatory Access Control Seccurity Access Control Role-based Access Control
Mandatory Access Control
In the Unix/Linux Operating System permissions on a files and directories consist of: (Ex... rwxrwxrwx (Check All that Apply) Other Group Policies Owner or User
Other Group Owner or User
What is a piece of software (or a combination of software and hardware) that stores passwords for your organizatino in a secure fashion. Secure Hold Password Keeper Password Vault Local Keep
Password Vault
What technology is an authentication technology rather than an access control technology? Pluggable Authentication Systems (PAS) Role-based Access Control (RBAC) Pluggable Authentication Modules (PAM) Mandatory Access Control (MAC)
Pluggable Authentication Modules (PAM)
What model assigns intermediate roles to assigned users instead of direct permissions. User-based access control (UBAC) Role-based access control (RBAC) Role-based Permission Control (RBPC) User-based Permission Control (UBPC)
Role-based access control (RBAC)
To navigate the UNIX/Linux directory structure, you use the ____ command. cd jump mv nav
cd
What command changes the root directory of a process? chown chmod chroot chproc
chroot
What is the most important characteristic of a good password? length secure easy common
length
What command is used to determine the ownership of a file? rm filename ls -l filename mv filename list -l filename
ls -l filename
What command do you use to delete files in Unix/Linux? rm cp mv del
rm
For security reasons, most Unix/Linux systems allow _________ logins to be disabled on terminals through network access, except on the main console. service user group root
root
What account on a Unix System is known as the "superuser" account? sudo admin root superuser
root
Special User Acconts, also known as Pseudo-users,, have their password replaced in the /etc/shaow file with a _________ so that their accounts cannot be logged in to. star (*) blank pound (#) exclamation (!)
star (*)
What account substitues the user identity, effectively allowing you to login as that user account. su - username sudo - username login - username log - username
su - username
What program can be utilized to allow a user specific commands to be run as a different user, without giving full access to the users account. For example, the ability to cat a file that "root" owns. su root runas sudo
sudo
What tricks can subvert the usage of sudo? (Check all that Apply) sudo sudo sudo /bin/sh Shell Escapes sudo su
sudo /bin/sh Shell Escapes sudo su