|
Security is a central concern of the system administrator. In this chapter, you have learned the basic concepts and practices of system security. The tools introduced will be useful when attempting to secure a system connected to the Internet.
| 1. | Which of the following files do not need to be owned by a user ?
| |
| 2. | Which of the following printouts represents a possible output from the id command?
| |
| 3. | What is the UID of the superuser?
| |
| 4. | Name one restriction placed on the root account?
| |
| 5. | Name the default permissions mask set in the user s shell?
| |
| 6. | How could read, write, and execute permissions be set on a file called /etc/passwd for all users?
| |
| 7. | How could read, write, and execute permissions be removed from a file called /etc/passwd for all users who do not belong to the owner s group ?
| |
| 8. | Which command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users?
| |
Answers
| 1. | D. All files need to be owned by someone. |
| 2. | B. All UIDs and GIDs must be positive and the UID precedes the GID. |
| 3. | A. The UID of the superuser is always 0, even if the name is changed from root to something else. |
| 4. | C. Credentials are required, unless blanket access is granted by use of hosts .equiv or .rhosts. |
| 5. | D. The umask is the default permissions mask. |
| 6. | A. All users are denoted by a in permissions strings. |
| 7. | D. Permissions are removed with - . |
| 8. | A. The who command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users. |