Mod 8 Day 4 Flashcards

1
Q

What are the three main files associated with each user

A

/etc/passwd
/etc/shadow
/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What file was used for authentication and authorization

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This file is used for Authentication

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What file is used for authorization

A

/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Syntax for locking down an account

A

passwd -l

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information on the account is normally the first entry within what file

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Solaris and Linux this command creates user accounts or updates default new user information

A

Useradd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Solaris and Linux this command updates a users authentication token or it’s used by root user to set and modify password settings

A

Passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a Linux only command and is used to change and view user password expiration (age) information

A

Chage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This command is used in both Solaris and Linux and it’s used to change some of the parameters set with useradd

A

Usermod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This command is used in both Solaris and Linux and it deletes a user account

A

Userdel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This command is used in both Solaris and Linux it converts information in /etc/passwd to /etc/shadow

A

Pwconv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This command is used in both Solaris and Linux, it prints real and effective UID and GID

A

id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Most Network Services are configured through ______ this is sometimes referred to as the internet super Daemon

A

Inetd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This file provides inetd configuration instructions, the format for this file is similar across all platforms

A

/etc/inetd.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To stop a service from starting up during boot-up what sign needs to be placed in front of the services entry in the inetd.conf?

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Changes to /etc/inetd.conf don’t take effect until the inetd __________ is restarted

18
Q

Network Services in Linux are provided by what

19
Q

This command turns on or off Network Services right now

20
Q

This command turns on or off system Services right now

21
Q

List of clients not having access to this service

22
Q

Specifies time range when a particular service may be used time range must be stated in 24 hour format

A

Access_times

23
Q

List of authorized clients, if a tribute has no value service access is denied

24
Q

This is a Linux command used to start or stop services in the xinetd.d directory in those found in the RC run levels

25
What file list port to service mappings on *nix systems
/etc/services
26
On a Unix system rpcbind is mapped to what port
TCP 111
27
What file Maps RPC services to find in the inetd.conf or xinetd.conf to the appropriate RPC program numbers
/etc/rpc
28
This command is used in Solaris and Linux and displays a map of RPC Services configured to their appropriate port
rpcinfo -p
29
Linux uses this command to view and modify in IP
Ifconfig
30
This Linux command stops starts or displays the status of the NFS script
Service
31
Sambas functionality comes from to Demons what are they
smbd nmbd
32
Implements file and Print Services as well as authentication and authorization
smbd
33
Provides other major SMB/CIFS components: name resolution and service announcement
nmbd
34
Samba's configuration file read by the SMB service is
/etc/samba/smb.conf
35
This command is used to manage somebody user accounts located in a private password database
pdbedit
36
This command changes the security context type of a file or process the -R option is used to recursively effect subdirectories in all files
Chcon
37
Similar to chmod this command modifies the owner and or group of a directory or file
Chown
38
What are the two key sections of smb.conf
Global settings and share definitions
39
This section defines server-wide settings such as network-related options
Global settings
40
This section applies to directories files and printers the key share are sections are displayed as homes and printers
Share definition