IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION Flashcards
___ command is the group quota management file.
(COMMAND) aquota.group
___ command is the user quota management file.
(COMMAND) aquota.user
___ command assigns a new group owner to a file.
(COMMAND) chgrp
___ command modifies permissions to a file.
(COMMAND) chmod
___ command assigns a new user owner to a file
(COMMAND) chown
___ command is associated with the enterprise cryptographic filesystem.
(COMMAND) ecryptfs
___ command to check and edit user quotas.
(COMMAND) edquota
___ command is the Linux second extended filesystem.
(COMMAND) ext2
___ command is the Linux third extended filesystem; includes journaling.
(COMMAND) ext3
___ command is the Linux fourth extended filesystem; includes journaling and support for larger files.
(COMMAND) ext4
___ command is one Linux partition configuration tool.
(COMMAND) fdisk
___ command to review ACL settings for a file.
(COMMAND) getfac 1
___ command that can encrypt and add digital signatures to a file.
(COMMAND) gpg
___ command is the mount command option that sets user quotas; often found in
/ etc / fstab
(COMMAND) grpquota
___ Linux command to format and build a Linux filesystem. It is also a root for filesystem-specific commands such as (COMMAND) mkfs . ext3 and mkfs . risers, which set up a filesystem to the given format.
(COMMAND) mkfs
___ command is the default account for unauthorized users who connect to the NFS file-sharing server.
(COMMAND) nfsnobody
___ command is the default account for users on certain configured file-sharing servers.
(COMMAND) nobody
___ command creates, checks, and repairs quota management files such as (COMMAND) aquota . user and aquota . group.
(COMMAND) quotacheck
___ command is the Linux filesystem based on balanced trees, suited for groups of large and small files.
(COMMAND) reiserfs
By itself, ___ command is the name of the standard Linux administrative user. The top-level root directory is symbolized by the forward slash (/). In contrast, the home directory of the root user is /root, which is a subdirectory of the top-level root directory (/).
(COMMAND) root
___ command to create or modify ACL settings for a file.
(COMMAND) setfac 1
___ command is the main configuration file for the Samba/CIFS file server.
(COMMAND) smb.conf
___ command is the mount command option that sets user quotas; often found in / etc/fstab.
(COMMAND) usrquota
___ command is the main configuration file for the very secure FTP daemon service.
(COMMAND) vsftpd.conf
___ command is the Linux filestytem developed by Silicon Graphics suited to larger files.
(COMMAND) xfs
___ is an encryption standard configured by the National Institute of Standards and Technology (NIST).
(AES) Advanced Encryption Standard
___ is the system used to encrypt partitions and disks. Part of the device mapper and associated with the loadable (COMMAND) dm_crypt module.
Disk encryption subsystem
___ is anagram for Digital Signature Algorithm, originally used by the US government for digital signatures.
DSA
___ is a system adapted by Ubuntu to encrypt directories: uses the ecryptfs command.
(eCryptfs) enterprise cryptographic filesystem
___ is a probabilistic encryption scheme developed by There Elgamal (ElGamal).
Elgamal
___ is a protocol for organizing and storing files. Most require a format; typical formats include ext2, ext3, ext4, reiserfs and xfs commands.
Filesystem
___ is the way files and directories are organized in Linux. It includes a list of standard directories and the types of files normally stored in those directories.
(FHS) Filesystem hierarchy standard
___ isa data structure associated with a file.
Inode
___ refers to a filesystem that keeps track of changes to be written. Recovery tools can then use the journal to quickly find data on files to be written.
Journaled filesystem
___ refers to tools that depend on drivers and modules loaded with the Linux kernel.
Kernel-space
___ is a disk encryption specification that requires the (COMMAND) de_crypt module.
(LUKS) Linux unified key setup
___ is a public-key encryption algorithm, named for its developers, Rivest, Shamir, and Adleman.
RSA
___ is a set of cryptographic hash functions developed by the US National Security Agency.
(SHA) Secure hash algorithm
___ is a version of redundant array of independent disks that uses partitions instead of disks as components of the array.
Software RAID
___ refers to tools that do not depend on the Linux kernel.
User-space
- Which of the following directories are suitable for separate filesystems? (Select two) The answer is stated in (COMMAND) FORM
- /etc/
- /home/
- /lib/
- /var/
/home/
/var/
- Which of the following directories typically includes files associated with third-party applications? The answer is stated in (COMMAND) FORM
- /etc/
- /home/
- /opt/
- /use/
/opt/
- Which of the following directories is most well suited as a read-only filesystem? The answer is stated in (COMMAND) FORM
- /boot/
- /home/
- /mnt/
- /srv/
/boot/
- Which of the following filesystem formats is best suited for a smaller filesystem?
- ext2
- ext3
- ext4
- reiserfs
ext2
- The command that lists currently loaded GPG keys is ___.
gpg –list-keys
- Which of the following directories contain GPG private and public keys?
- .gpg
- .gpgkeys
- .gnupg
- .keys
.gnupg
- Which of the following commands is associated with the Linux unifies key setup disk encryption specification?
- dcrypt
- ecryptfs
- gpg
- cryptsetup
cryptsetup
- Which of the folioing commands prohibits access from all users except the user owner and members of the group that owns the file named (COMMAND) filename?
- chmod 770 filename
- chmod 707 filename
- chmod 077 filename
- chmod 007 filename
chmod 770 filename
- Which of the following commands sets the SUID bit on the file named filename?
- chmod 1770 filename
- chmod 2750 filename
- chmod 770 filename
- chmod 3777 filename
chmod 770 filename
- IF you try to change files remotely on a shared NFS directory as the root administrative user, what happens?
- The change fails, because the root user on one system is the nobody user on another system.
- The change is successful
- The change is successful even if the NFS directory is shared in read-only mode.
- The change fails unless you log in with the root administrative password from the remote system.
The change fails, because the root user on one system is the nobody user on another system.
- Which of the following Samba directives specify permissions of files created a shared network directory.
- create_octal
- create_mask
- create_options
- create_write
create_mask
- Which of the following directories is appropriate for quotas?
- /etc/
- /home/
- /opt/
- /usr/
/home/
- Which of the following commands lists quota usage by user?
- quota
- repquota
- quotacheck
- quotarep
repquota
- what configuration file is used to configure ACLs for a filesystem?
- /etc/fstab
- /etc/acl
- /etc/pam.d/acl
- /etc/filesystem
/etc/fstab
- The command that lists the current ACL rules on the local file named test 1 is ___.
Assume your user account is the owner of file test1.
getfac1 test 1