Term
A file can have many owners but only one group.
True or False? |
|
Definition
|
|
Term
Which is NOT an essential duty required to shut down the system?
a) Kill nonessential services b) Start new processes c) Log the shutdown d) Wait for filesystem writes to complete
|
|
Definition
|
|
Term
| GRUB loads the Linux kernel from this directory. |
|
Definition
|
|
Term
Most processes inherit the current directory of the process that started them.
True or False? |
|
Definition
|
|
Term
| Setting the default runlevel to 6 would |
|
Definition
Cause the computer to continuously reboot.
|
|
|
Term
| This command will lock a user account. |
|
Definition
|
|
Term
On CentOS /usr/sbin/adduser is just a symbolic link to /usr/sbin/useradd.
True or False? |
|
Definition
|
|
Term
| This is the default user shell on CentOS and most other Linux distributions. |
|
Definition
|
|
Term
| When the kernel runs a program that has its "setuid" or "setgid" bit set it.... |
|
Definition
Changes the effective UID or GID to the file containing the program image
|
|
|
Term
| On current Linux systems user passwords are stored in this file. |
|
Definition
|
|
Term
| This command on CentOS adds or removes startup scripts, manages the run levels at which they operate and lists the run level for which a script is configured. |
|
Definition
|
|
Term
| Startup scripts are found in this directory |
|
Definition
|
|
Term
| If you must edit the /etc/passwd by hand you should use this program to prevent file corruption. |
|
Definition
|
|
Term
| This is the default boot loader for most UNIX and Linux systems with Intel processors. |
|
Definition
|
|
Term
Which is NOT a shortcoming of the traditional UNIX access control model
a) If the root account is comprised the integrity of the system is violated
b) is not supported by all Unix and Linux variants
c) Minimal support for auditing
d) Redefining system behavior requires modifying source code
|
|
Definition
b) is not supported by all Unix and Linux variants
|
|
|
Term
| To change the default length of time that passwords are valid you would edit this file. |
|
Definition
|
|
Term
| Traditionally, groups are defined in this configuration file. |
|
Definition
|
|
Term
Under a mandatory access control system users can set access control parameters on the objects they control.
True or False? |
|
Definition
|
|
Term
Name that location:
Kernel and files needed to load the kernel |
|
Definition
|
|
Term
Name that location:
Critical startup and configuration files |
|
Definition
|
|
Term
Name that location:
Default home directories for users |
|
Definition
|
|
Term
Name that location:
Information about all running processes |
|
Definition
|
|
Term
Name that location:
Mount points for filesystems on removable media |
|
Definition
|
|
Term
Name that location:
Core operating system commands |
|
Definition
|
|
Term
Name that location: Various system log files |
|
Definition
|
|
Term
PAM helps answer the question, "How do I know this is really jstudent?"
True or False? |
|
Definition
|
|
Term
| To attach your USB key manually to the filesystem hierarchy you would use this command. |
|
Definition
|
|
Term
| Cancel a pending shutdown. |
|
Definition
|
|
Term
The su command is only used to login as root.
True or False? |
|
Definition
|
|
Term
| When a user's account is locked this character appears in front of the password field in the /etc/shadow file. |
|
Definition
|
|
Term
| This command will lock a user account. |
|
Definition
|
|