Security is a central concern of the system administrator. In this chapter, you have learned the basic concepts and practices of system security. The tools introduced will be useful when attempting to secure a system connected to the Internet.
1. | Which of the following files do not need to be owned by a user ?
|
|
2. | Which of the following printouts represents a possible output from the id command?
|
|
3. | What is the UID of the superuser?
|
|
4. | Name one restriction placed on the root account?
|
|
5. | Name the default permissions mask set in the user s shell?
|
|
6. | How could read, write, and execute permissions be set on a file called /etc/passwd for all users?
|
|
7. | How could read, write, and execute permissions be removed from a file called /etc/passwd for all users who do not belong to the owner s group ?
|
|
8. | Which command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users?
|
|
Answers
1. | D. All files need to be owned by someone. |
2. | B. All UIDs and GIDs must be positive and the UID precedes the GID. |
3. | A. The UID of the superuser is always 0, even if the name is changed from root to something else. |
4. | C. Credentials are required, unless blanket access is granted by use of hosts .equiv or .rhosts. |
5. | D. The umask is the default permissions mask. |
6. | A. All users are denoted by a in permissions strings. |
7. | D. Permissions are removed with - . |
8. | A. The who command displays the username, connecting line, date of login, idle time, process ID, and a comment for all logged-in users. |