Sun Certified Solaris 9.0 System and Network Administrator AllinOne Exam Guide [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Sun Certified Solaris 9.0 System and Network Administrator AllinOne Exam Guide [Electronic resources] - نسخه متنی

Paul Watters

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید





Summary


Security is a central concern of the system administrator. In this chapter, you have learned the basic concepts and practices of system security. The tools introduced will be useful when attempting to secure a system connected to the Internet.


Questions




























1.


Which of the following files do not need to be owned by a user?



  1. Directories



  2. Device files



  3. Metadevices



  4. None of the above






2.


Which of the following printouts represents a possible output from the id command?



  1. gid=1001(scott) uid=100(tiger)



  2. uid=1001(scott) gid=100(tiger)



  3. uid=1001(scott) gid=-100(tiger)



  4. None of the above






3.


What is the UID of the superuser?



  1. 0



  2. 1



  3. 100



  4. 666






4.


Name one restriction placed on the root account?



  1. The root user cannot read other users’ e-mail



  2. The root user cannot delete a user’s account without their permission



  3. The root user cannot rlogin to another system as root without a credential



  4. The root user cannot modify disk partition sizes






5.


Name the default permissions mask set in the user’s shell?



  1. mask



  2. omask



  3. chmod



  4. umask






6.


How could read, write, and execute permissions be set on a file called /etc/passwd for all users?



  1. chmod a+rwx /etc/passwd



  2. chmod o+rwx /etc/passwd



  3. chmod u+rwx /etc/passwd



  4. chmod u-rwx /etc/passwd






7.


How could read, write, and execute permissions be removed from a file called /etc/passwd for all users who do not belong to the owner’s group?



  1. chmod a+rwx /etc/passwd



  2. chmod o+rwx /etc/passwd



  3. chmod u+rwx /etc/passwd



  4. chmod o-rwx /etc/passwd






8.


Which command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users?



  1. who



  2. w



  3. which



  4. show






Answers



























1.


D. All files need to be owned by someone.


2.


B. All UIDs and GIDs must be positive and the UID precedes the GID.


3.


A. The UID of the superuser is always 0, even if the name is changed from root to something else.


4.


C. Credentials are required, unless blanket access is granted by use of hosts.equiv or .rhosts.


5.


D. The umask is the default permissions mask.


6.


A. All users are denoted by “a” in permissions strings.


7.


D. Permissions are removed with “-”.


8.


A. The who command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users.





/ 265