Linux Security In Class Exam 2
A journaled filesystem keeps track of changes to be written to the filesystem.
True
After configuring quotas on a Linux system, you can use the edquota command to edit the quota of a specific user.
True
Files on a device are accessible only when they're mounted on a Linux directory.
True
If the kernel file is overwritten with a binary that doesn't work or if the file is erased, the system won't boot again until the kernel file is replaced.
True
In Linux, a volume is a way to segment a drive and a partition is a single entity that can be formatted with a filesystem.
False
Red Hat uses the Linux unified key setup (LUKS) disk-encryption specification.
True
The "chroot" in chroot jail means change root.
True
A chroot jail is a special way of confining a program to a specific part of the filesystem.
True
If you set up write access in a Samba configuration file, the create mask = 0700 directive sets up read and write permissions for the user owner of new files.
True
In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP).
True
The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG).
True
You can configure the /boot/ directory as a separate filesystem.
True
In Linux, you cannot encrypt individual partitions.
False
In Linux, a mount point is a directory.
True
In the filesystem hierarchy standard (FHS), the top-level root directory (indicated by the forward slash [/]), is never mounted separately.
False
Regarding Linux file permissions, r-x indicates read, write, and execute permissions.
False
The chmod command changes file ownership in Linux.
False
The fdisk command encrypts files in Linux.
False
The identifiers ext4, FAT32, and NTFS are types of kernels.
False
The ls -p command displays file and folder permissions.
False