Examining User Information Flashcards

1
Q

The id command displays…?

A

user and group information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The whoami reports the…?

A

current username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The who, users, and w commands report …?

A

users with active sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

id -g, –group …?

A

Print only effective group id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

id -G –groups ..?

A

Print all group ids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

id -u, –user …?

A

Print only effective user id.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

id -n, –name …?

A

Print user or group name instead of number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If called without arguments, the id command returns…?

A

a summary of group memberships for the user who ran it. If supplied with a username, the id command reports group information for the specified user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

By default, ls reports the….?

A

user’s user id, primary group and primary group id, and all groups (primary and secondary) to which the user belongs, both by group name and group id.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The output of the id command can be qualified with…?

A

the command line switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The id command can report…?

A

one or more piece of information, starting with context=, known as the SELinux context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SELinux, or “Security Enhanced Linux”, involves …?

A

topics which will be covered in more detail in later course, and for now can be safely ignored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The whoami command simply…?

A

reports the current user’s username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Red Hat Enterprise Linux, there is seldom a need to use the whoami command, because…?

A

the default bash prompt displays the current user’s username. The prompt is configurable, however, and on other Linux or Unix systems, or in other environments (such as rescue shells), a user’s identity might not be as obvious. Also, the whoami command can be embedded in a script, which could take on different behavior depending on who’s running it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Often, a user would like to know who else is using a particular Linux or Unix machine. Red Hat Enterprise Linux provides three commands which report current users, each at a different level of detail. THe simplest of these is the…?

A

users command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The w command lists…?

A

current logged on users, but provides much more detailed information.

17
Q

w command:

User…?

A

The username of the logged user

18
Q

w command:

TTY…?

A

The terminal that the user logged in from. (Interpreting terminals is discussed in Workbook 1 (Quick Tour)).

19
Q

w command:

FROM…?

A

If the user is logged in over the network, the host name that the user connected from.

20
Q

w command:

LOGIN@…?

A

The time that the user started the session.

21
Q

w command:

IDLE…?

A

How much time has expired since the terminal has seen interaction.

22
Q

w command:

JCPU…?

A

The amount of CPU time consumed by all currently running processes associated with the terminal session.

23
Q

w command:

PCPU…?

A

The amount of CPU time consumed by the only current process only, as named in the “WHAT” field.

24
Q

w command:

WHAT…?

A

The user’s currently running process.

25
Q

Who command provides…?

A

detailed information about who is currently logged on. Called without arguments, it behaves similarly to the w command. The who command is also designed to report system events, such as the current runlevel, system clock adjustments, and processes automatically spawned by the /sbin/init process.

26
Q

The finger command can be used to..?

A

“check up” on a user, to see not only if that user is logged on, but if the have read their mail, what time they last logged in, and other information as well.

27
Q

Without arguments, the finger command acts much like the who command, giving…?

A

information including a user’s terminal (Tty), login time, and idle time.

28
Q

A user can customize the information someone sees when they are fingered, by…?

A

creating specially named hidden files in their home directory.

29
Q

Files known by the finger command:

.plan…?

A

Displayed by the finger command, under the heading “Plan”

30
Q

Files known by the finger command:

.project…?

A

Displayed by the finger command, under the heading “Project”

31
Q

Files known by the finger command;

.pgpkey…?

A

Displayed by the finger command, under the heading “PGP Key” This is a convenient way for a user to publish the public key portion of a public/private key pair used in public key encryption.

32
Q

My default in Red Hat Enterprise Linux, a user’s home directory is completely inaccessible to…?

A

other users on the system. In order for the finger command to find these files, a user must execute permissions on their home directory, using a command similar to the following: ( chmod o+x ~)

33
Q

The finger command can report user activity on…?

A

remote machines, as well. For the command to work, the remote machine nimbus.example.com must elect to run the finger service. In the early days of the Internet, Unix machines commonly ran this service. Now that the Internet has grown, and the demands of security often outweigh the spirit of the community, most admin choose to not run the finger services.