Summary

Security is a central concern of the system administrator. In this chapter, you have learned the basic concepts and practices of system security. The tools introduced will be useful when attempting to secure a system connected to the Internet.

Questions

1.  

Which of the following files do not need to be owned by a user ?

  1. Directories

  2. Device files

  3. Metadevices

  4. None of the above

 d. all files need to be owned by someone.

2.  

Which of the following printouts represents a possible output from the id command?

  1. gid=1001(scott) uid=100(tiger)

  2. uid=1001(scott) gid=100(tiger)

  3. uid=1001(scott) gid=-100(tiger)

  4. None of the above

 b. all uids and gids must be positive and the uid precedes the gid.

3.  

What is the UID of the superuser?

  1. 1

  2. 100

  3. 666

 a. the uid of the superuser is always 0, even if the name is changed from root to something else.

4.  

Name one restriction placed on the root account?

  1. The root user cannot read other users e-mail

  2. The root user cannot delete a user s account without their permission

  3. The root user cannot rlogin to another system as root without a credential

  4. The root user cannot modify disk partition sizes

 c. credentials are required, unless blanket access is granted by use of hosts.equiv or .rhosts.

5.  

Name the default permissions mask set in the user s shell?

  1. mask

  2. omask

  3. chmod

  4. umask

 d. the umask is the default permissions mask.

6.  

How could read, write, and execute permissions be set on a file called /etc/passwd for all users?

  1. chmod a+rwx /etc/passwd

  2. chmod o+rwx /etc/passwd

  3. chmod u+rwx /etc/passwd

  4. chmod u-rwx /etc/passwd

 a. all users are denoted by a in permissions strings.

7.  

How could read, write, and execute permissions be removed from a file called /etc/passwd for all users who do not belong to the owner s group ?

  1. chmod a+rwx /etc/passwd

  2. chmod o+rwx /etc/passwd

  3. chmod u+rwx /etc/passwd

  4. chmod o-rwx /etc/passwd

 d. permissions are removed with - .

8.  

Which command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users?

  1. who

  2. w

  3. which

  4. show

 a. the who command displays the username, connecting line, date of login, idle time, process id, and a comment for all logged-in users.

Answers

1.  

D. All files need to be owned by someone.

2.  

B. All UIDs and GIDs must be positive and the UID precedes the GID.

3.  

A. The UID of the superuser is always 0, even if the name is changed from root to something else.

4.  

C. Credentials are required, unless blanket access is granted by use of hosts .equiv or .rhosts.

5.  

D. The umask is the default permissions mask.

6.  

A. All users are denoted by a in permissions strings.

7.  

D. Permissions are removed with - .

8.  

A. The who command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users.

 
 
   


Sun Certified Solaris 9.0 System and Network Administrator
Sun Certified Solaris(tm) 9 System and Network Administrator All-in-One Exam Guide
ISBN: 0072225300
EAN: 2147483647
Year: 2003
Pages: 265
Authors: Paul Watters

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net