Term
A file can have many owners but only one group.
True or False? |
|
Definition
|
|
Term
Which is NOT an essential duty required to shut down the system?
a) Kill nonessential services b) Start new processes c) Log the shutdown d) Wait for filesystem writes to complete
|
|
Definition
|
|
Term
GRUB loads the Linux kernel from this directory. |
|
Definition
|
|
Term
Most processes inherit the current directory of the process that started them.
True or False? |
|
Definition
|
|
Term
Setting the default runlevel to 6 would |
|
Definition
Cause the computer to continuously reboot.
|
|
|
Term
This command will lock a user account. |
|
Definition
|
|
Term
On CentOS /usr/sbin/adduser is just a symbolic link to /usr/sbin/useradd.
True or False? |
|
Definition
|
|
Term
This is the default user shell on CentOS and most other Linux distributions. |
|
Definition
|
|
Term
When the kernel runs a program that has its "setuid" or "setgid" bit set it.... |
|
Definition
Changes the effective UID or GID to the file containing the program image
|
|
|
Term
On current Linux systems user passwords are stored in this file. |
|
Definition
|
|
Term
This command on CentOS adds or removes startup scripts, manages the run levels at which they operate and lists the run level for which a script is configured. |
|
Definition
|
|
Term
Startup scripts are found in this directory |
|
Definition
|
|
Term
If you must edit the /etc/passwd by hand you should use this program to prevent file corruption. |
|
Definition
|
|
Term
This is the default boot loader for most UNIX and Linux systems with Intel processors. |
|
Definition
|
|
Term
Which is NOT a shortcoming of the traditional UNIX access control model
a) If the root account is comprised the integrity of the system is violated
b) is not supported by all Unix and Linux variants
c) Minimal support for auditing
d) Redefining system behavior requires modifying source code
|
|
Definition
b) is not supported by all Unix and Linux variants
|
|
|
Term
To change the default length of time that passwords are valid you would edit this file. |
|
Definition
|
|
Term
Traditionally, groups are defined in this configuration file. |
|
Definition
|
|
Term
Under a mandatory access control system users can set access control parameters on the objects they control.
True or False? |
|
Definition
|
|
Term
Name that location:
Kernel and files needed to load the kernel |
|
Definition
|
|
Term
Name that location:
Critical startup and configuration files |
|
Definition
|
|
Term
Name that location:
Default home directories for users |
|
Definition
|
|
Term
Name that location:
Information about all running processes |
|
Definition
|
|
Term
Name that location:
Mount points for filesystems on removable media |
|
Definition
|
|
Term
Name that location:
Core operating system commands |
|
Definition
|
|
Term
Name that location: Various system log files |
|
Definition
|
|
Term
PAM helps answer the question, "How do I know this is really jstudent?"
True or False? |
|
Definition
|
|
Term
To attach your USB key manually to the filesystem hierarchy you would use this command. |
|
Definition
|
|
Term
Cancel a pending shutdown. |
|
Definition
|
|
Term
The su command is only used to login as root.
True or False? |
|
Definition
|
|
Term
When a user's account is locked this character appears in front of the password field in the /etc/shadow file. |
|
Definition
|
|
Term
This command will lock a user account. |
|
Definition
|
|