IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION Flashcards

1
Q

___ command is the group quota management file.

A

(COMMAND) aquota.group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ command is the user quota management file.

A

(COMMAND) aquota.user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ command assigns a new group owner to a file.

A

(COMMAND) chgrp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ command modifies permissions to a file.

A

(COMMAND) chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ command assigns a new user owner to a file

A

(COMMAND) chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ command is associated with the enterprise cryptographic filesystem.

A

(COMMAND) ecryptfs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ command to check and edit user quotas.

A

(COMMAND) edquota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ command is the Linux second extended filesystem.

A

(COMMAND) ext2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ command is the Linux third extended filesystem; includes journaling.

A

(COMMAND) ext3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ command is the Linux fourth extended filesystem; includes journaling and support for larger files.

A

(COMMAND) ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ command is one Linux partition configuration tool.

A

(COMMAND) fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ command to review ACL settings for a file.

A

(COMMAND) getfac 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ command that can encrypt and add digital signatures to a file.

A

(COMMAND) gpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ command is the mount command option that sets user quotas; often found in
/ etc / fstab

A

(COMMAND) grpquota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ Linux command to format and build a Linux filesystem. It is also a root for filesystem-specific commands such as (COMMAND) mkfs . ext3 and mkfs . risers, which set up a filesystem to the given format.

A

(COMMAND) mkfs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ command is the default account for unauthorized users who connect to the NFS file-sharing server.

A

(COMMAND) nfsnobody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ command is the default account for users on certain configured file-sharing servers.

A

(COMMAND) nobody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___ command creates, checks, and repairs quota management files such as (COMMAND) aquota . user and aquota . group.

A

(COMMAND) quotacheck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ command is the Linux filesystem based on balanced trees, suited for groups of large and small files.

A

(COMMAND) reiserfs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

By itself, ___ command is the name of the standard Linux administrative user. The top-level root directory is symbolized by the forward slash (/). In contrast, the home directory of the root user is /root, which is a subdirectory of the top-level root directory (/).

A

(COMMAND) root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ command to create or modify ACL settings for a file.

A

(COMMAND) setfac 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ command is the main configuration file for the Samba/CIFS file server.

A

(COMMAND) smb.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

___ command is the mount command option that sets user quotas; often found in / etc/fstab.

A

(COMMAND) usrquota

24
Q

___ command is the main configuration file for the very secure FTP daemon service.

A

(COMMAND) vsftpd.conf

25
Q

___ command is the Linux filestytem developed by Silicon Graphics suited to larger files.

A

(COMMAND) xfs

26
Q

___ is an encryption standard configured by the National Institute of Standards and Technology (NIST).

A

(AES) Advanced Encryption Standard

27
Q

___ is the system used to encrypt partitions and disks. Part of the device mapper and associated with the loadable (COMMAND) dm_crypt module.

A

Disk encryption subsystem

28
Q

___ is anagram for Digital Signature Algorithm, originally used by the US government for digital signatures.

A

DSA

29
Q

___ is a system adapted by Ubuntu to encrypt directories: uses the ecryptfs command.

A

(eCryptfs) enterprise cryptographic filesystem

30
Q

___ is a probabilistic encryption scheme developed by There Elgamal (ElGamal).

A

Elgamal

31
Q

___ is a protocol for organizing and storing files. Most require a format; typical formats include ext2, ext3, ext4, reiserfs and xfs commands.

A

Filesystem

32
Q

___ is the way files and directories are organized in Linux. It includes a list of standard directories and the types of files normally stored in those directories.

A

(FHS) Filesystem hierarchy standard

33
Q

___ isa data structure associated with a file.

A

Inode

34
Q

___ refers to a filesystem that keeps track of changes to be written. Recovery tools can then use the journal to quickly find data on files to be written.

A

Journaled filesystem

35
Q

___ refers to tools that depend on drivers and modules loaded with the Linux kernel.

A

Kernel-space

36
Q

___ is a disk encryption specification that requires the (COMMAND) de_crypt module.

A

(LUKS) Linux unified key setup

37
Q

___ is a public-key encryption algorithm, named for its developers, Rivest, Shamir, and Adleman.

A

RSA

38
Q

___ is a set of cryptographic hash functions developed by the US National Security Agency.

A

(SHA) Secure hash algorithm

39
Q

___ is a version of redundant array of independent disks that uses partitions instead of disks as components of the array.

A

Software RAID

40
Q

___ refers to tools that do not depend on the Linux kernel.

A

User-space

41
Q
  1. Which of the following directories are suitable for separate filesystems? (Select two) The answer is stated in (COMMAND) FORM
  2. /etc/
  3. /home/
  4. /lib/
  5. /var/
A

/home/

/var/

42
Q
  1. Which of the following directories typically includes files associated with third-party applications? The answer is stated in (COMMAND) FORM
  2. /etc/
  3. /home/
  4. /opt/
  5. /use/
A

/opt/

43
Q
  1. Which of the following directories is most well suited as a read-only filesystem? The answer is stated in (COMMAND) FORM
  2. /boot/
  3. /home/
  4. /mnt/
  5. /srv/
A

/boot/

44
Q
  1. Which of the following filesystem formats is best suited for a smaller filesystem?
  2. ext2
  3. ext3
  4. ext4
  5. reiserfs
A

ext2

45
Q
  1. The command that lists currently loaded GPG keys is ___.
A

gpg –list-keys

46
Q
  1. Which of the following directories contain GPG private and public keys?
  2. .gpg
  3. .gpgkeys
  4. .gnupg
  5. .keys
A

.gnupg

47
Q
  1. Which of the following commands is associated with the Linux unifies key setup disk encryption specification?
  2. dcrypt
  3. ecryptfs
  4. gpg
  5. cryptsetup
A

cryptsetup

48
Q
  1. Which of the folioing commands prohibits access from all users except the user owner and members of the group that owns the file named (COMMAND) filename?
  2. chmod 770 filename
  3. chmod 707 filename
  4. chmod 077 filename
  5. chmod 007 filename
A

chmod 770 filename

49
Q
  1. Which of the following commands sets the SUID bit on the file named filename?
  2. chmod 1770 filename
  3. chmod 2750 filename
  4. chmod 770 filename
  5. chmod 3777 filename
A

chmod 770 filename

50
Q
  1. IF you try to change files remotely on a shared NFS directory as the root administrative user, what happens?
  2. The change fails, because the root user on one system is the nobody user on another system.
  3. The change is successful
  4. The change is successful even if the NFS directory is shared in read-only mode.
  5. The change fails unless you log in with the root administrative password from the remote system.
A

The change fails, because the root user on one system is the nobody user on another system.

51
Q
  1. Which of the following Samba directives specify permissions of files created a shared network directory.
  2. create_octal
  3. create_mask
  4. create_options
  5. create_write
A

create_mask

52
Q
  1. Which of the following directories is appropriate for quotas?
  2. /etc/
  3. /home/
  4. /opt/
  5. /usr/
A

/home/

53
Q
  1. Which of the following commands lists quota usage by user?
  2. quota
  3. repquota
  4. quotacheck
  5. quotarep
A

repquota

54
Q
  1. what configuration file is used to configure ACLs for a filesystem?
  2. /etc/fstab
  3. /etc/acl
  4. /etc/pam.d/acl
  5. /etc/filesystem
A

/etc/fstab

55
Q
  1. The command that lists the current ACL rules on the local file named test 1 is ___.
    Assume your user account is the owner of file test1.
A

getfac1 test 1