Linux 1 Flashcards

Chapter 6-12 RHE

1
Q

Term/Command

A

Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

/home

A

Directory containing user home directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

/root

A

Home directory for the root user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

/etc/passwd

A

File containing user account information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

/etc/shadow

A

File containing encrypted passwords and other security information for user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

/etc/group

A

File containing group account information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

/etc/gshadow

A

File containing encrypted passwords and other security information for group accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

/etc/dnf.conf

A

Configuration file for the DNF package manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

/etc/ssh/sshd_config

A

Configuration file for the SSH daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

/etc/yum.repos.d/

A

Directory containing YUM repository configuration files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

/etc/hostname

A

File containing the system hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

/etc/hosts

A

File mapping hostnames to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

/etc/resolv.conf

A

File containing DNS resolver configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

alias

A

Command to create aliases for other commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

bash

A

Command to execute the Bash shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cat

A

Command to concatenate and display file contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cut

A

Command to extract sections from each line of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dnf

A

Package manager command for Fedora/RHEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

echo

A

Command to display a line of text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

env

A

Command to display environment variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

export

A

Command to set environment variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

file

A

Command to determine file type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

grep

A

Command to search text patterns in files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

gzip

A

Command to compress files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

gunzip

A

Command to decompress gzip files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

head

A

Command to display the beginning of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

history

A

Command to display command history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

less

A

Command to view files with pagination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

let

A

Command for integer arithmetic in Bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

locate

A

Command to find files by name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

man

A

Command to display manual pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

nologin

A

Shell used for users who are not allowed to log in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

pwd

A

Command to print current working directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

set

A

Command to set or unset shell options and positional parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

sort

A

Command to sort lines of text files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

tail

A

Command to display the end of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

tar

A

Command to manipulate tape archives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

tee

A

Command to read from standard input and write to standard output and files simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

tr

A

Command to translate or delete characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

type

A

Command to display information about commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

umask

A

Command to set default permissions for new files and directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

uniq

A

Command to remove duplicate lines from sorted files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

unset

A

Command to unset environment variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

wc

A

Command to count words, lines, and characters in a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

whereis

A

Command to locate binary, source, and manual page files for a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

which

A

Command to display the full path of shell commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

whoami

A

Command to display the current username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

cp

A

Command to copy files and directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

find

A

Command to search for files in a directory hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

ln

A

Command to create links between files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ls

A

Command to list directory contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

mkdir

A

Command to create directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

mv

A

Command to move or rename files and directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

rm

A

Command to remove files or directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

rmdir

A

Command to remove empty directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

touch

A

Command to create empty files or update file timestamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

bg

A

Command to move a job to the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

chage

A

Command to change user password expiry information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

chfn

A

Command to change user information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

chgrp

A

Command to change group ownership of files and directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

chmod

A

Command to change file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

chown

A

Command to change file owner and group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

chsh

A

Command to change the user’s login shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

fg

A

Command to bring a job to the foreground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

free

A

Command to display amount of free and used memory in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

groupadd

A

Command to create a new group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

groupdel

A

Command to delete a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

groupmod

A

Command to modify a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

iostat

A

Command to display CPU and I/O statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

jobs

A

Command to list active jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

kill

A

Command to send signals to processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

killall

A

Command to kill processes by name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

nice

A

Command to run a command with modified scheduling priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

passwd

A

Command to change user password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

pkill

A

Command to send signals to processes based on name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ps

A

Command to display information about processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

pstree

A

Command to display a tree of processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

renice

A

Command to alter the priority of running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

rpm

A

Package manager command for RPM-based Linux distributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

shutdown

A

Command to shut down or reboot the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

su

A

Command to switch user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

sudo

A

Command to execute a command as another user with superuser privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

top

A

Command to display system resource usage and running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

updatedb

A

Command to update the file database used by locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

useradd

A

Command to create a new user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

userdel

A

Command to delete a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

usermod

A

Command to modify user account attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

watch

A

Command to execute a program periodically and display the output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

uname

A

Command to display system information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

dig

A

Command-line DNS lookup utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

host

A

Command-line utility for performing DNS lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

hostname

A

Command to display or set the system’s hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

ip

A

Command to show/manipulate routing, devices, policy routing, and tunnels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

ping

A

Command to send ICMP Echo Request to network hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

ping6

A

Command to send ICMPv6 Echo Request to network hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

ss

A

Command to investigate sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

tracepath

A

Command to discover the MTU along the path to a target destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

traceroute

A

Command to trace the route that packets take to reach a network host

99
Q

traceroute6

A

Command to trace the route that IPv6 packets take to reach a network host

100
Q

nmcli

A

Command-line interface for NetworkManager

101
Q

ssh

A

Command to connect to a remote machine securely using the SSH protocol

102
Q

ssh-copy-id

A

Command to copy SSH keys to a remote server’s authorized keys file

103
Q

ssh-keygen

A

Command to generate, manage, and convert authentication keys for SSH

104
Q

OpenSSH

A

Suite of secure networking utilities based on the SSH protocol

105
Q

NetworkManager

A

Daemon managing network connections and devices

106
Q

sshd

A

SSH daemon responsible for securely accepting connections, providing shell access, etc.

107
Q

systemctl

A

Command to control systemd system and service manager

108
Q

systemctl –version

A

Command to display the systemd version

109
Q

systemctl is-active

A

Command to check if a unit is active

110
Q

systemctl isolate multi-user.target

A

Command to change the system state to multi-user mode

111
Q

systemctl isolate graphical.target

A

Command to change the system state to graphical mode

112
Q

systemctl status x.service

A

Command to display status of a specific service

113
Q

systemctl stop x.service

A

Command to stop a specific service

114
Q

systemctl enable x.service

A

Command to enable a specific service to start automatically at boot

115
Q

systemctl disable x.service

A

Command to disable a specific service from starting automatically at boot

116
Q

systemctl list-dependencies x.service

A

Command to list dependencies of a specific service

117
Q

systemctl list-dependencies x.target

A

Command to list dependencies of a specific target

118
Q

systemctl list-units

A

Command to list loaded units (services)

119
Q

systemctl list-units –type service

A

Command to list loaded services

120
Q

systemctl list-unit-files

A

Command to list installed unit files

121
Q

/etc/systemd/

A

Directory containing systemd configuration files

122
Q

/usr/lib/systemd/system/

A

Directory containing systemd unit files

123
Q

/etc/systemd/system/

A

Directory containing user-created systemd unit files

124
Q

/etc/systemd/system/default.target

A

Symbolic link to the default systemd target unit

125
Q

/etc/systemd/system/multi-user.target.wants/

A

Directory containing symlinks to services that should be started when the system enters multi-user mode

126
Q

/etc/systemd/system/multi-user.target

A

Symbolic link to the multi-user target unit

127
Q

/etc/systemd/system/sysinit.target

A

Symbolic link to the sysinit target unit

128
Q

/etc/systemd/system/basic.target

A

Symbolic link to the basic target unit

129
Q

/etc/systemd/system/graphical.target

A

Symbolic link to the graphical target unit

130
Q

^Z

A

Keyboard shortcut to suspend a process

131
Q

^C

A

Keyboard shortcut to interrupt/terminate a process

132
Q

^D

A

Keyboard shortcut to signal end-of-file (EOF)

133
Q

&

A

Special character used for job control and running processes in the background

134
Q

Process Attributes and States

A

Different states a process can be in: Running (R), Sleeping (S), Stopped (T), Dead (D), Idle (I), Zombie (Z)

135
Q

Environment variables

A

Variables that define the environment in which a process runs

136
Q

Standard input

A

Default input stream for a process

137
Q

Standard output

A

Default output stream for a process

138
Q

Standard error

A

Default error output stream for a process

139
Q

Healthy Multiuser System

A

Maintaining system health and stability with multiple users

140
Q

Regular Maintenance

A

Scheduled tasks and routines to ensure system reliability

141
Q

Software Update with RHEL

A

Updating software packages and repositories with Red Hat Enterprise Linux (RHEL)

142
Q

Usernames and UserIDs (UIDs)

A

Identifiers used to uniquely identify users on a Unix-like operating system

143
Q

root account

A

Superuser account with administrative privileges

144
Q

system accounts

A

Special user accounts used by system services and daemons

145
Q

user accounts

A

Accounts created for individual users

146
Q

Network Interface Names

A

Naming conventions for network interfaces

147
Q

Security Best Practices

A

Best practices for ensuring system and network security

148
Q

Public and Private Keys

A

Cryptographic keys used for authentication and encryption

149
Q

File globbing

A

Pattern matching for file and directory names

150
Q

Absolute and relative paths

A

Methods for specifying the location of files and directories

151
Q

File formats

A

Formats and structures of commonly used system files

152
Q

/etc/passwd

A

Format of the password file containing user account information

153
Q

/etc/group

A

Format of the group file containing group account information

154
Q

Importance of Software Updates

A

Importance of keeping software up to date to address security vulnerabilities and bugs

155
Q

Concept of Package Management

A

Managing software installation, updates, and removal in a systematic manner

156
Q

Dependency concept

A

Relationship between software packages and their dependencies

157
Q

Package Managers

A

Tools used for installing, upgrading, configuring, and removing software packages

158
Q

RPM Package Manager

A

Package management system used in Red Hat-based Linux distributions

159
Q

chown command

A

Changes file ownership. The -R option recursively changes the ownership of a directory tree.

160
Q

umask command

A

Displays or sets the default file permissions for newly created files.

161
Q

Default umask values for Bash

A

Defined in /etc/login.defs and might be affected by settings in /etc/profile, /etc/bashrc, files in /etc/profile.d, or user’s shell initialization files.

162
Q

suid, sgid, and sticky bits

A

Special permissions providing additional access-related features to files.

163
Q

Process

A

A running instance of an executable program, with states including running, sleeping, stopped, or zombie.

164
Q

ps command

A

Lists processes running on the system.

165
Q

Terminal Session

A

Each terminal has its own session, with a foreground process and independent background processes.

166
Q

jobs command

A

Displays processes within a terminal session.

167
Q

Signal

A

A software interrupt reporting events to an executing program.

168
Q

kill command

A

Sends a signal to control processes.

169
Q

pkill command

A

Sends a signal to control processes based on process names.

170
Q

killall command

A

Sends a signal to control processes based on process names.

171
Q

Load Average

A

An estimate of how busy the system is.

172
Q

top command

A

Displays dynamic real-time information about running processes and system resource usage.

173
Q

uptime command

A

Displays how long the system has been running and the average system load over different time intervals.

174
Q

w command

A

Displays information about currently logged-in users and what they are doing, including load average.

175
Q

systemd

A

Provides a method for activating system resources, server daemons, and other processes at boot time and on a running system.

176
Q

systemctl start/stop/reload/enable/disable [service]

A

Commands used with systemctl to manage services, including starting, stopping, reloading, enabling, and disabling.

177
Q

systemd utility

A

Used to manage service units, socket units, and path units.

178
Q

systemctl status [unit]

A

Command used to determine the status of system daemons and network services started by the systemd utility.

179
Q

systemctl list-dependencies [unit]

A

Command to list all service units that a specific service unit depends on.

180
Q

Masking a service unit

A

systemd feature allowing a service unit to be masked so that it does not run, even to satisfy dependencies.

181
Q

ssh command

A

Allows users to securely access remote systems using the SSH protocol.

182
Q

Known Hosts files (~/.ssh/known_hosts and /etc/ssh/ssh_known_hosts)

A

Files where client systems store identities of remote servers.

183
Q

SSH authentication types

A

Supports both password-based and key-based authentication methods.

184
Q

ssh-keygen command

A

Generates an SSH key pair for authentication.

185
Q

ssh-copy-id command

A

Exports the public key to remote systems for key-based authentication.

186
Q

sshd service

A

Implements the SSH protocol on Red Hat Enterprise Linux systems.

187
Q

/etc/ssh/sshd_config file

A

Configuration file for advanced SSH settings.

188
Q

Recommended SSH configurations

A

Disable remote logins as root and require public key authentication instead of password-based authentication.

189
Q

TCP/IP network model

A

A simplified, four-layered model describing how different protocols interoperate for sending traffic over the internet.

190
Q

IPv4

A

The primary network protocol used on the internet today.

191
Q

IPv6

A

Intended as a replacement for IPv4 network protocol.

192
Q

Dual-stack mode

A

Red Hat Enterprise Linux operates using both IPv4 and IPv6 protocols simultaneously by default.

193
Q

Network routes

A

Determine the correct network interface to send packets to a particular network.

194
Q

NetworkManager daemon

A

Monitors and manages network configuration.

195
Q

nmcli command-line tool

A

Configures network settings with the NetworkManager daemon.

196
Q

Network configurations directory

A

In Red Hat Enterprise Linux 9, the default location is /etc/NetworkManager/system-connections.

197
Q

System’s static hostname

A

Stored in the /etc/hostname file.

198
Q

hostnamectl command

A

Modifies or views the status of the system’s hostname and related settings.

199
Q

Red Hat Subscription Management

A

Provides tools for entitlements, updates, and tracking support contracts and subscriptions.

200
Q

RPM packages

A

Software provided in RPM format for installation, upgrading, and uninstallation on the system.

201
Q

rpm command

A

Can query local database for package information and install downloaded package files.

202
Q

dnf utility

A

A powerful command-line tool for installing, updating, removing, and querying software packages.

203
Q

Application Streams

A

Red Hat’s feature to provide a single repository hosting multiple versions of application packages and dependencies.

204
Q

For hardening purposes, what is the primary benefit of having the file /etc/shadow?

A

It stores encrypted user passwords, making them unreadable directly.

205
Q

Which of the following represents the symbolic permission to give the owner read and write access, the group only read access, and others no access?

A

u=rw,g=r,o=-

206
Q

If a Linux file has the permissions -rw-r–r–, who has the ability to write to the file?

A

Only the owner

207
Q

Which of the following files contains encrypted passwords of users?

A

/etc/shadow

208
Q

Setting the ‘s’ bit on a file in the user ownership does which of the following:

A

All processes created using that file run with the user ownership of the command file

209
Q

To be able to change into directory Dir1, what is the minimum permissions necessary for the Dir1 directory?

A

Execute (x)

210
Q

What is the octal permission of a directory that allows the owner to access files if they know their names, but not to list or to change the file names?

A

100

211
Q

Setting the ‘s’ bit on a directory in the group ownership does which of the following:

A

All files created in that directory will have the same group ownership as the parent directory

212
Q

The UID and GID for a user can be found in which file?

A

/etc/passwd

213
Q

The /etc/group file contains information about:

A

Group memberships

214
Q

For system hardening purposes, how can an administrator restrict a specific user from using the sudo command to gain superuser privileges?

A

Explicitly deny the user in the /etc/sudoers file or associated configurations.

215
Q

In the context of Linux access controls, what does DAC stand for?

A

Discretionary Access Control

216
Q

Setting the ‘s’ bit on a file in the group ownership does which of the following:

A

All processes created using that file run with the group ownership of the command file

217
Q

In an empty directory, you run the commands: touch ??? * ; chmod 111 * chmod 444 ??? ; chmod 666 ‘*’ ; chmod 333 * What permissions are on file ??? after above commands?

A

-wx -wx -wx

218
Q

What is the octal mode of a directory that allows only the user to cd into it and list the names in it and create any new files?

A

700

219
Q

Which command is used to change the ownership of a file in Linux?

A

chown

220
Q

Which of the following commands is used to show the user’s own identity and group information?

A

id

221
Q

Which of the following commands can be used to change the ownership of a file in Linux?

A

chown

222
Q

Which file in Linux contains the encrypted passwords of users?

A

/etc/shadow

223
Q

Which command is used to modify an existing user’s information in Linux?

A

usermod

224
Q

Which of the following commands is used to change a user’s default login shell?

A

chsh

225
Q

In the file /etc/group, what does the last field represent?

A

List of users

226
Q

What is the easiest way for root to allow a regular user in Red Hat Enterprise Linux to run any administrator commands with sudo?

A

Add the user to the wheel group

227
Q

What value of umask gives the permissions below to a new file: rw-rw-r–

A

2

228
Q

You are working at the Linux command line and your username is “homer”. You execute the command ls and see the following output: -rw-rw-r– 1 homer homer 387 Nov 28 08:26 bigfoot -rwxr-xr-x 1 homer homer 1851882 Nov 28 08:26 dragon -rwxrwxr-x 1 homer homer 15957213 Nov 28 08:26 kraken What command can you type which will remove execute permission from the file dragon for all users except yourself?

A

chmod 744 dragon

229
Q

Refer to the exhibit above. What would be the permissions of f1.txt after executing the last command?

A

700

230
Q

When hardening a server system, which account should have its direct login access blocked?

A

Root user

231
Q

In a Linux system, which account type is created for running specific services or applications?

A

System users

232
Q

If an administrator wants to efficiently manage multiple users’ default settings upon creation, which directory plays a critical role?

A

/etc/skel

233
Q

What Linux command can be used to set the default permissions for all newly created files?

A

umask

234
Q

Which command allows you to view the groups a user belongs to?

A

id

235
Q

If an administrator wishes to prevent a specific user from using the sudo command, they should edit which file?

A

/etc/sudoers

236
Q

What command is used to create a new group?

A

groupadd

237
Q

To ensure a user cannot directly log into the system, which shell should be assigned in /etc/passwd?

A

/bin/nologin

238
Q

In a multi-user GNU/Linux environment, which command is the safest to use when changing a user’s default shell?

A

chsh

239
Q

What Linux command can be used to change the group of a file?

A

chgrp

240
Q

You are working at the Linux command line. What command can you type which will result in a new file being given the following permissions by default: - The file owner can read and write to the file, but not execute it. - Everyone other than the owner can read the file, but not write to or execute it.

A

umask 133

241
Q

The filename /etc/passwd is a(n) _________________.

A

Absolute path

242
Q

Which of the following is not true of the root user?

A

The root user can access any computer on the network.

243
Q

Which Access Control Technique is based on security labels and is mandatory regardless of the user’s wishes?

A

MAC