LT4 User Privileges and Permissions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Linux, the UID is a system defined number to represent a group account, while the GID is a system defined number to represent a user account.

False

If you saw the following permission on a file -rwsr-xr-x and the owner of the file was the root account, then the account of anyone executing that file would temporarily be given (i.e. elevated to) root privilege as the file was being executed.

True

NIS and LDAP are the two main network authentication tools mentioned in out text.

True

The /etc/shadow file was created so the encrypted user passwords would no longer be in /etc/passwd where they could potentially be copied and decrypted with password cracker software.

True

The standard permissions of read, write, and execute can be represented by the numbers 4, 2, and 1 (and in that order, i.e. rwx).

True

Linux user accounts can be only be associated with a security group by typing a command from the command line prompt, i.e. you can not add accounts to a group by manually editing the /etc/group file.

false

The /etc/group file contains a field that has a semi-colon delimited list of all the users who are members of a specific group.

false

The /etc/passwd file has been in use less than 5 years and contains the user's password.

false

The default values for the shadow password suite can be found in the /etc/skel file.

false

The sudo command requires you to know the root password, but it doesn't leave you in a root shell once the command is executed.

false

The three standard categories of user permissions on a file are represented by the characters o (owner), g (general), and e (everybody else).

false

Using the sudo command requires entering the root password (not your own password).

false

A PAM configuration file allows you to use PAM modules to construct custom authentication and other security for a user attempting to use a command or service.

true

A line in a PAM configuration file will contain a module type, control flag, the name of the module, and possible optional arguments.

true

A salted password means extra characters were added to the password before it was hashed (making it harder for a password cracker program to to crack the password).

true

Because the syntax of the sudoers file is so complex, a special version of vi called visudo will automatically check your syntax as the sudoers file is being saved and not allow you to save a changed sudoers file with serious syntax errors.

true

If a log file name has a number on the end of the name (for example: /var/log.secure.1), the number refers to a sequential generation of that file, such as a different log file for each week.

true

If you want more information on a command to manage a user account (such as how to use the useradd command), you could either Google the command or consult the online Linux manual by typing "man <command name>" at the command line prompt.

true

In the sudoers file, a "%" in front of an account name means you are working with a group account, and that the configuration line refers to everyone in that group as opposed to a single account.

true

Rather than using the sudo command to temporarily get root priviledges, you could use the su command to become the root account (assuming you know the root password) and remain at the root privilege level until you log out of the resulting root shell. But many administrators would consider remaining in the root shell as dangerous because the root account is too powerful and could easily allow you to delete data by mistake.

true

Since any physical device (like a tape drive or CD) is treated like a file in Linux, you can enter commands at a command line prompt that will read or write to a device just like you would issue commands to read and write to a text file.

true

The /etc/yp.conf configuration file is used by the NIS network authentication tool.

true

The command (assuming you had the permission to execute it successfully), "find / -group dip", would find all the files where dip is the group owner.

true

The command chmod ug=6 filex is equivalent to chmod ug=rw filex

true

The following (when see as part of the output from an ls -l command) would mean the owner/user has read, write, and execute privileges, while the group owner members only have read and write privileges, and everybody else only has read privileges. -rwxrw-r--

true

The purpose of the /etc/sudoers file is to specify who can use sudo to execute specific commands with the privileges a specified user (such as root).

true

The su -c '<actual command>' will execute <actual command> with root privileges, and you still have to know the root password, but you won't remain at a root prompt after the <actual command> executes.

true

The su command will prompt you for the root password (not your password), and allow you to execute commands with root privileges.

true

When looking at an /etc/passwd record for a user account, an "x" in the password column means the encrypted password for the account is in the /etc/shadow file.

true

chmod ugo=7 would result in the following permission for the three primary categories of users. user/owner - rwx group owner - rwx other - rwx

true


Set pelajaran terkait

Chapter 1: "Understanding Teams"

View Set

MBA 620, Financial Management (Chapter #1 Review)

View Set

A&P: Chapter 7 Practice Questions

View Set

21年战略 肖迪 主观题记忆版

View Set

INTRO TO HEALTH ULTIMATE STUDY GUIDE

View Set