Part 3 File Systems: Lesson 12 Flashcards

0
Q

How do ACLs differ from standard UNIX filesystem permissions?

A

Standard UNIX file system permissions allow only for permissions to be set for one owner, one group, and all others. ACLs, on the other hand, allow for an essentially unlimited list of permissions entries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

How do you identify the ownership and permissions of a file folder in the Finder?

A

An item’s ownership and permissions can be identified using the Get Info or Inspector windows in the Finder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the locked file flag?

A

The locked file flag prevents anyone, including the item’s owner, from editing an item. Only the item’s owner can unlock the item to then allow modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is the root, or beginning level of a user’s home folder visible to other users?

A

The root level of a user’s home folder is visible to other users so they can navigate to the Public shared folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the default organization of the filesystem allow users to safely share local files and folders?

A

Every home folder contains a Public folder that other users can read, and a Drop Box folder that other users can write to. All other subfolders in a user’s home folder (except the optional Sites folder) have default permissions that don’t allow access to other users. The Shared folder is also set for all users to share items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is unique about the permissions of the /Users/Shared folder?

A

The shared folder is set up to allow all users to read and write files, but only the user who owns an item can delete it from the Shared folder. This is accomplished using the sticky bit permission settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean when you choose to “Ignore volume ownership in the Finder? What are the security ramifications of ignoring volume ownership?

A

You can choose to ignore ownership on any nonsystem volume. This ignores any ownership rules and grants any logged-on user unlimited access to the contents of the volume. It’s a potential security risk because it allows any local user account to have full access to the volume even if that user didn’t originally mount the volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly