4.3 Special Permissions and Managing Services Flashcards

1
Q

Linux categorizes files, programs, and directories as ___________.

A

Linux categorizes files, programs, and directories as items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managing Access Controls in Linux

Each _______ has privileges set for the owner of the _________, the _______associated with the item, and _______.

A

Each item has privileges set for the owner of the item, the group associated with the item, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For each of these categories, there are three actions that we can allow or prevent: ______, ______, ______.

A

For each of these categories, there are three actions that we can allow or prevent: read, write, execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Inspecting File Permissions

Interpret the following:

-rw-r–r–

A

A file that only the owner can read and write, group and other / world permission only read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Changing File Permissions

File permissions can be set using two different notations: ______ and ______.

A

File permissions can be set using two different notations: symbolic and octal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the command:

To invoke the root user for one command only.

A

sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the command:

To switch to another user, in this case the root user.

A

su

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the command:

To edit the sudoers file

A

visudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the command:

To list the sudo privileges for a user.

A

sudo -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the command:

To determine the current user.

A

whoami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ________ command allows a user to change their password.

A

The passwd command allows a user to change their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Use special permissions for three basic scenarios:

A
  1. Allowing multiple users to make changes to the same files inside a shared directory.
  2. Limiting users to only making changes to their own files within a shared directory.
  3. Allowing any user on the system to run a specific program as the root user.

For each of these three scenarios, there is a different
special bit setting that we can add to an item’s permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ________ and ________ can be used together to allow a group of users to collaborate in the same directory.

A

The SGID and sticky bits can be used together to allow a group of users to collaborate in the same directory.

When set together, they allow users to make changes to the same directory, but only to files they own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The __________ bit lives in the execute position for the group permissions.

A

The Set Group ID (SGID) bit lives in the execute position for the group permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the command:

A very small and simple command to locate executables in the system.

A

which command is very small and simple command to locate executables in the system.

It allows user to pass several command names as arguments to get their paths in the system. “which” commands searches the path of executable in system paths set in $PATH environment variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ are computers that offer services to other computers.

A

Servers are computers that offer services to other computers.

17
Q

A ________ is a function or capability that a machine makes available to another.

A

A service is a function or capability that a machine makes available to another.

18
Q

What is samba?

A

Samba (SMB), the file sharing protocol, allows users to view, download, and store files remotely.

19
Q

Some services are not run by real users. They are run by ________. They are run by specific service users that are dedicated to running their own specific service

A

Some services are not run by real users. They are run by specific users. They are run by specific service users that are dedicated to running their own specific service.

20
Q

A service user usually has a system _____________ and cannot log in to use a shell.

A

A service user usually has a system UID less than 1000 and cannot log in to use a shell.

21
Q

True or False:

Since service users aren’t humans who need to log into and interact with the machine, it’s best practice to ensure that users cannot log into an interactive shell using a service username.

A

True