Introduction to Linux II

Introduction to Linux II Chapter 7 Exam Answer 2016

Rate this post

1. A normal (non root) user has which type of access to the /etc/passwd file?

  • Read only
  • Execute, read, and write
  • Read and write
  • Write only

2. The /etc/passwd file can be modified by which of the following?

  • Remote user
  • Group account
  • Any user
  • Root user

3. A normal user, joe has the following record in the /etc/passwd file. What does the x indicate?. joe:x:1021:1020:purchase_dept_user:/home/usr/joe:/bin/bash

  • Password for user joe is locked
  • Password for user joe is x
  • joe has not yet set his password
  • The encrypted password has been stored in the /etc/shadow file

4. Refer to following record in the passwd file:. test_user:x:521:520:hr_dept_user:/home/usr/test_user:/bin/bash. UID and GID for test_user are, respectively:

  • 520 and 521
  • 21 and 20
  • 521 and 520
  • 521 and 1041

5. Which of the following info about users is not present in passwd file record?

  • The user’s shell
  • The user’s account name
  • The user’s home directory
  • The user’s password

6. Regular users can modify their GECOS information using which of the following commands?

  • set
  • finger
  • chfn
  • passwd

7. Which of the following commands CANNOT be used to update user information in the /etc/passwd file?

  • chfn
  • finger
  • useradd
  • usermod

8. The root user can convert the password of any user into readable text form.. True or False?

  • True
  • False

9. Which of the following information is not stored in the /etc/shadow file?

  • Default home directory
  • Encrypted password
  • Days since last password change
  • Maximum number of days remaining for the password to expire

10. A regular user wants a password that never expires. The Maximum field value in the /etc/shadow file should be set to:

  • No value
  • *
  • 99999
  • 1

11. The system administrator wants to create a temporary user account to be used for only five days. Immediately after five days, the account should become unavailable for login. The following values should be set for the temporary user in the shadow file:

  • Maximum=5
  • Warn=5
  • Minimum=5
  • Expire date=today+5

12. In the /etc/shadow file, a user record has !! as the first two characters in the encrypted password field. What does this signify?

  • The password has !! as the first two characters
  • The password is about to expire
  • The account is locked
  • No significance, it is encrypted text

13. The system administrator wants to make the password empty for user Don. He should execute the passwd command with which of the following options?

  • –a Don
  • –d Don
  • –l Don
  • –u Don

14. A Linux administrator modifies the values of UID_MAX and UID_MIN parameters in the /etc/login.defs file. This in effect will allow her to:

  • Assign UID and GID within the specified range for all users
  • Assign GID within the specified range for new users
  • Change password expiration policy for existing users
  • Assign UID within the specified range for new users

15. The research team for ABC Corp is being increased from one to five members. What is the best way to add new team members to the server?

  • Create a group named research , with each member given an account belonging to the group.
  • Create a new login account named research that all new members share
  • Create individual users and assign them root privileges
  • Add new users with blank passwords

16. A user is a member of three different secondary groups. Which file will contain information regarding his membership in these secondary groups?

  • /etc/login.defs
  • /etc/passwd
  • /etc/shadow
  • /etc/group

17. The groups command displays your current primary group as the first group while the getent command will always display the default primary group.

True or False?

  • True
  • False

18. An account on a Linux system has a UID of 50. Which type of account is this?

  • Temporary account
  • System account
  • Regular user account
  • Group account

19. Which option, when used with useradd command, will display the default options that are used when creating a new user?

  • –f
  • –D
  • –e
  • –m

20. A new user was created using the command useradd steve. The command grep steve/etc/shadow will show the password field for this account as:

  • Null
  • Blank
  • x
  • !!

21. Running the command useradd benon a system with User Private Groups will create:

  • A user ben and a group ben both are created
  • Only a new user ben is created
  • A user ben and login directory is created
  • Only a group ben is created

22. Changes in the /etc/skel directory will apply to:

  • All existing users
  • None – the /etc/skel directory has no effect on user accounts
  • New users having their home directory in /etc/
  • New users created using useradd command

23. The command passwd –S test_user produces the following output:. test_user NP 03/28/2014 0 99999 7 -1. What information does this convey regarding the password status of the test_user account?

  • There is no password
  • Locked password
  • New password stored in /etc/shadow
  • Set but non-printable password

24. Using the command passwd –e test_user, the root user can force a password change in the next login attempt.. True or False?

  • True
  • False

25. The command chage CANNOT be used to:

  • Delete a user
  • Update information related to password expiry
  • View password aging policies
  • Enforce a password changing and expiry policy for specific user accounts

26. Which of the following commands will set the grace login period of 10 days after the password has expired?

  • chage –m 5 temp_user
  • chage –I 10 temp_user
  • chage –E “2014-06-01” temp_user
  • chage –W 10 temp_user

27. User lori reported that her account is locked. Which of the following commands will unlock her account?

  • usermod –L lori
  • usermod lori –e 2014-04-30
  • usermod –U lori
  • usermod lori –g sales

28. The system administrator wants to delete the user account joe. However, joe is already logged in to the system. Which of the following commands will allow the administrator to delete joe?

  • userdel –r joe_user
  • usermod –d –f joe_user
  • userdel joe_user
  • userdel –f joe_user

29. Which of the following commands will allow the root user to create a new group for the sales department and assign this new group the GID of 1250?

  • Specific GID cannot be assigned
  • groupadd sales_group 1250
  • groupadd sales_group –g 1250
  • groupadd sales_group –n 1250

30. The system administrator notices that a file shows a numeric group id 1508. What does this signify?

  • Group name corresponding to GID 1508 is deleted
  • The file belongs to a system group id
  • Group name is 1508
  • The system has been hacked

Related Articles

1
Leave a Reply

avatar
Photo and Image Files
 
 
 
Audio and Video Files
 
 
 
Other File Types
 
 
 
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
1 Comment authors
Mickey Recent comment authors

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
newest oldest most voted
Notify of
Mickey
Guest
Mickey

This has made my day. I wish all potnisgs were this good.

Back to top button
Close

Send this to a friend