CS 446 Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If you set up write access in a Samba configuration file, the create mask = 0700 directive sets up read and write permissions for the user owner of new files. A. True B. False

A. True

In the shadow password suite, the /etc/gshadow file may store a hashed password for a group. A. True B. false

A. True

The chmod command changes file ownership in Linux. A. True B. False

B. False

samba

The Linux implementation of Microsoft networking. Current Linux systems can share directories and printers on a Microsoft-based network. It's even possible to have a Samba-based network of nothing but Linux computers.

In the shadow password suite, the /etc/group file contains basic information for each group account. A. True B. False

A. True

Red Hat uses the Linux unified key setup (LUKS) disk-encryption specification. A. True B. False

A. True

The sg command allows a user to join a group on a temporary basis. A. True B. False

A. True

Which mounting option enables user quotas on a filesytem? A. usrquota B. enable quotas C. edquota D. rw

A. usrquota

Which filesystem is a good candidate for mounting in read-only mode? A. /tmp/ B. /var/ C. /root/ D. /boot/

D. /boot/

Symetric Encryption

same key to encrypt and decrypt (AES-256)

The most common standard for file encryption on Linux is based on GNU Privacy Guard (GPG). A. True B. False

A. True

The set user ID (SUID) bit is a special permission that allows others to execute a given file with the rights of the user owner of the file. A. True B. False

A. True

Configuring a user account policy with minimum password length, maximum days for using a password, and various user logins can be performed by editing the ________ file. A. /etc/passwd B. /etc/login.defs C. /etc/shadow D. /etc/gshadow

B. /etc/login.defs

In Linux, three major services that network files and folders are the Network File System (NFS), Samba, and the File Transfer Protocol (FTP). A. True B. False

A. True

In the password shadow suite, the difference between /etc/shadow and /etc/gshadow is that with /etc/gshadow, passwords are rarely configured. A. True B. False

A. True

In the user private group scheme, Linux users are typically assigned to at least one group, which is based on that user's account. A. True B. False

A. True

Lightweight Directory Access Protocol (LDAP) uses an encryption certificate to avoid transmitting passwords over a network in cleartext. A. True B. False

A. True

Log files that record login attempts and login failures classify log messages as auth and authpriv. A. True B. False

A. True

Pluggable authentication modules (PAM) allows users to be authenticated with local password stores and by way of network authentication, using facilities like Network Information Service (NIS) and the Lightweight Directory Access Protocol (LDAP). A. True B. False

A. True

You are encrypting a file with GPG and want to confirm the creation of a private and public key pair. Which command do you run? A. gpg --list-keys B. gpg --gen-key C. gpg -keys D. gpg: keyring

A. gpg --list-keys

An executable file with the _________ allows other users to run that command, with the permissions assigned to that user owner. A. set user ID (SUID) bit B. Set Group ID Bit (SGID) bit C. sticky bit D. Set Group ID Bit (SGID) and the sticky bit

A. set user ID (SUID) bit

Which directive do you add or enable in the Samba configuration file to prohibit access to the [homes] share by anyone other than the owner? A. valid users = %S B. write list = @admin C. create mask = 0700 D. directory mask = 0700

A. valid users = %S

Which directory renders many applications unusable, including logging into the graphical user interface (GUI), if the space allocated to the /tmp/ filesystem is full? A. /etc/ B. /tmp/ C. /bin/ D. /var/

B. /tmp/

In Linux, a volume is a way to segment a drive and a partition is a single entity that can be formatted with a filesystem. A. True B. False

B. False

In the filesystem hierarchy standard (FHS), the top-level root directory (indicated by the forward slash [/]), is never mounted separately. A. True B. False

B. False

Pluggable authentication modules (PAM) solves administrative permission problems by providing higher-level functions without having the whole program gain administrative access. A. True B. False

B. False

The fdisk command encrypts files in Linux. A. True B. False

B. False

The latest versions of Linux use the syslogd and klogd service daemons to configure logging for services and the kernel. A. True B. False

B. False

The /usr/ directory contains programs that are generally accessible to all users. This directory can be secured by mounting it ______. A. as read-write B. as read-only C. as SWAP type D. remotely

B. as read-only

You set up an FTP server and configured it to allow users to access their home directories. Which directive should you also include in the configuration file for security purposes? A. local_enable = YES B. chroot_local_user = YES C. anonymous_enable=NO D. chroot_local_user = NO

B. chroot_local_user = YES

Linux unified key setup (LUKS) is a specification for ________. A. mounting filesystems B. disk encryption C. mounting remote services D. linux kernels

B. disk encryption

You can configure the /boot/ directory as a separate filesystem. A. True B. False

A. True

What is a valid reason for setting up the /home/ directory as a separate filesystem? A. You can upgrade the distribution at a later date with little risk to user files. B. It makes the system easier to boot. C. It reduces the number of variables associated with user accounts. D. It automatically creates a redundant array of independent disks (RAID) array.

A. You can upgrade the distribution at a later date with little risk to user files.

Console kit packages, such as polkit, contain three primary commands. Which of the following is NOT included? A. ck-permissions B. ck-history C. ck-list-sessions D. ck-launch-session

A. ck-permissions

Which Linux filesystem format does not include any type of journaling? A. ext2 B. ext3 C. ext4 D. xfs

A. ext2

Hashing/Digest

One way encryption no "decryption", use on passwords and pin numbers and generated for a file (SHA 256), Md5

du command

disk usage, shows sizes and directories of all files

dig website.com

domain information

How do you tar a directory named src into a file named backup.tar?

tar -cvf backup.tar src

Free

view memory stats

Vmstat

virtual memory

Which file is used to configure the various mounting options of a filesystem upon boot? A. /etc/mount B. /etc/fstab C. /var/filesystem D. /boot/config

B. /etc/fstab

Which Linux partition type is used for standard partitions with data? A. 82 B. 83 C. 85 D. fd

B. 83

How would you grant read and execute permissions to all for a file named data3.txt?

chmod a+rx data3.txt

How would you grant read and write permissions to the group for a file named data1.txt?

chmod g+rw data1.txt

How would you revoke write and execute permissions from others for a file named data2.txt?

chmod o-wx data2.txt

nologin

fake shell

Whois domain.com

find out who owns domain

nslookup espy.com

find website ip address

A journaled filesystem keeps track of changes to be written to the filesystem. A. True B. False

A. True

Which directory does the filesystem hierarchy standard (FHS) recommend for locating configuration files? A. /etc/ B. /var/ C. /opt/ D. /usr/

A. /etc/

After configuring quotas on a Linux system, you can use the edquota command to edit the quota of a specific user. A. True B. False

A. True

Cron is a service for running administrative jobs on a regular basis. A. True B. False

A. True

Which of the following contains primarily administrative commands? A. /opt/ B. /mnt/ C. /sbin/ D. /media/

C. /sbin/

/var/

The /var/ directory includes log files and print spools. Some distributions use it for network service files.

mkdir

The command creates a directory.

How do you rename file3.txt to file4.txt?

mv file3.txt file4.txt

A polkit mechanism includes a subject, an object, and an action. Which of the following is the subject? A. An administrative tool B. The device to be modified C. The file to be modified D. The method for modifying the device or configuration file

A. An administrative tool

Which of the following is the best choice for network authentication? A. Lightweight Directory Access Protocol (LDAP) B. Network Information Service (NIS) C. polkit D. openssl

A. Lightweight Directory Access Protocol (LDAP)

What user account information can be found in the /etc/passwd file? A. The user's basic information, such as the default login shell B. The user's encrypted password C. Information on when the user last changed the password D. The user's sudo permissions

A. The user's basic information, such as the default login shell

In Linux, a mount point is a directory. A. True B. False

A. True

polkit

a way of solving administrative permission problems. When programs need to temporarily escalate privileges, the polkit is a framework for providing higher-level functions without having the whole program gain administrative access

traceroute website.com

print out ip addressees of packet routes

Top

real time task manager

Which command is used to delete an empty directory named dst?

rmdir dst

Asymetric

Two key (public and private key)-if message is encrypted with public key then it must be decrypted with matching private key, and vice versa. Ex: RSA/El-Gamal/ Diffe-Hellman

Which of the following commands is used to delete a directory and all the files within the directory? A) rm -i B) rmdir C) rm -r D) rm -v

C) rm -r

You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command to update and install packages. Which command do you run? A. %users ALL=/sbin/fdisk /mnt/sda, /bin/yum B. %users ALL=/tmp/fdisk /dev/sda, /usr/bin/yum C. %users ALL=/sbin/fdisk /dev/sda, /usr/bin/yum D. %users ALL=/tmp/fdisk /mnt/sda, /bin/yum

C. %users ALL=/sbin/fdisk /dev/sda, /usr/bin/yum

Which filesystem hierarchy standard (FHS) directory can be mounted separately from the root directory? A. /sbin/ B. /bin/ C. /home/ D. /etc/

C. /home/

As specified in the FHS, log files are generally found in the _____ directory. A. /home/ B. /root/ C. /var/ D. /etc/

C. /var/

Df -m

how many mb are being used in partitions

What might a large increase in the size of an authorization log file indicate? A. More frequently run user-based cron jobs only B. A large number of external login attempts only C. More frequently run user-based cron jobs or a large number of external login attempts D. Neither more frequently run user-based cron jobs nor a large number of external login attempts

C. More frequently run user-based cron jobs or a large number of external login attempts

Each line in a ____ configuration file is set up in the following format: module_type control_flag module_file (arguments) A. LDAP B. NIS C. PAM D. polkit

C. PAM

If a share on a Microsoft Windows host needs to mount on the Linux filesystem, which network service would typically be used? A. Network File System (NFS) B. Network Information Service (NIS) C. Samba D. Secure Shell (SSH)

C. Samba

Which command formats all Linux filesystems, Microsoft VFAT, and NTFS filesystems? A. format B. fdisk C. mkfs D. mount

C. mkfs

Which entry in the standard /etc/sudoers file gives the root administrative user full privileges through sudo? A. admin ALL=(ALL) ALL B. %admin ALL=(ALL) ALL C. root ALL=(ALL) ALL D. sys ALL=(ALL) ALL

C. root ALL=(ALL) ALL

Which of the following control flags used in pluggable authentication modules (PAM) approves user access assuming that there are no previous failures? A. required B. requisite C. sufficient D. allow

C. sufficient

Which command is used to display the lines at the beginning of a file? (A) begin (B) end (C) tail (D) head

D head

The GRUB configuration file is generally located in the ______ directory. A. /home/ B. /root/ C. /var/ D. /boot/

D. /boot/

With which directory is the sticky bit most commonly associated? A. /home B. /bin C. /sbin D. /tmp

D. /tmp, allows s any user to add files to and delete files from a specified directory. The most common use for the sticky bit is this directory


Set pelajaran terkait

Chapter 11 venture growth management

View Set

Can I ask you some questions?我(wǒ) 可(kě)以(yǐ) 问(wèn)你(nǐ) 一(yì)些(xiē) 问(wèn)题(tí) 吗(ma)?

View Set

Christian Worldview Midterm- Rapinchuk

View Set

Topic 5: Regulatory framework II

View Set

Small Steps Chapter Four: You Can't Burn My Bear!

View Set

GMAT Math Memorize Number Properties & Formulas

View Set