Mod 8 Day 4 Flashcards

1
Q

What are the three main files associated with each user

A

/etc/passwd
/etc/shadow
/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What file was used for authentication and authorization

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This file is used for Authentication

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What file is used for authorization

A

/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Syntax for locking down an account

A

passwd -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information on the account is normally the first entry within what file

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Solaris and Linux this command creates user accounts or updates default new user information

A

Useradd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Solaris and Linux this command updates a users authentication token or it’s used by root user to set and modify password settings

A

Passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a Linux only command and is used to change and view user password expiration (age) information

A

Chage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This command is used in both Solaris and Linux and it’s used to change some of the parameters set with useradd

A

Usermod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This command is used in both Solaris and Linux and it deletes a user account

A

Userdel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This command is used in both Solaris and Linux it converts information in /etc/passwd to /etc/shadow

A

Pwconv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This command is used in both Solaris and Linux, it prints real and effective UID and GID

A

id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most Network Services are configured through ______ this is sometimes referred to as the internet super Daemon

A

Inetd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This file provides inetd configuration instructions, the format for this file is similar across all platforms

A

/etc/inetd.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To stop a service from starting up during boot-up what sign needs to be placed in front of the services entry in the inetd.conf?

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Changes to /etc/inetd.conf don’t take effect until the inetd __________ is restarted

A

Daemon

18
Q

Network Services in Linux are provided by what

A

Xinetd

19
Q

This command turns on or off Network Services right now

A

Chkconfig

20
Q

This command turns on or off system Services right now

A

Service

21
Q

List of clients not having access to this service

A

No_access

22
Q

Specifies time range when a particular service may be used time range must be stated in 24 hour format

A

Access_times

23
Q

List of authorized clients, if a tribute has no value service access is denied

A

Only_from

24
Q

This is a Linux command used to start or stop services in the xinetd.d directory in those found in the RC run levels

A

Chkconfig

25
Q

What file list port to service mappings on *nix systems

A

/etc/services

26
Q

On a Unix system rpcbind is mapped to what port

A

TCP 111

27
Q

What file Maps RPC services to find in the inetd.conf or xinetd.conf to the appropriate RPC program numbers

A

/etc/rpc

28
Q

This command is used in Solaris and Linux and displays a map of RPC Services configured to their appropriate port

A

rpcinfo -p

29
Q

Linux uses this command to view and modify in IP

A

Ifconfig

30
Q

This Linux command stops starts or displays the status of the NFS script

A

Service

31
Q

Sambas functionality comes from to Demons what are they

A

smbd

nmbd

32
Q

Implements file and Print Services as well as authentication and authorization

A

smbd

33
Q

Provides other major SMB/CIFS components: name resolution and service announcement

A

nmbd

34
Q

Samba’s configuration file read by the SMB service is

A

/etc/samba/smb.conf

35
Q

This command is used to manage somebody user accounts located in a private password database

A

pdbedit

36
Q

This command changes the security context type of a file or process the -R option is used to recursively effect subdirectories in all files

A

Chcon

37
Q

Similar to chmod this command modifies the owner and or group of a directory or file

A

Chown

38
Q

What are the two key sections of smb.conf

A

Global settings and share definitions

39
Q

This section defines server-wide settings such as network-related options

A

Global settings

40
Q

This section applies to directories files and printers the key share are sections are displayed as homes and printers

A

Share definition