Herramientas de usuario

Herramientas del sitio


lpic-102-q3

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory.

Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12

Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd –rotate D. logrotate E. logger

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x

Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit

Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod

Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow

Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh

What is true regarding the command userdel –force –remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted.

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group.

Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

respuestas

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.) Correct Answer: groupadd, /usr/sbin/groupadd

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.) Correct Answer: /etc/hosts.allow

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.) Correct Answer: /etc/shadow

Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory. Correct Answer: A

Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote Correct Answer: AB

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12 Correct Answer: A

Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd –rotate D. logrotate E. logger Correct Answer: D

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x Correct Answer: D

Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit Correct Answer: A

Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod Correct Answer: E

Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow Correct Answer: D

Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow Correct Answer: D

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh Correct Answer: ABD

What is true regarding the command userdel –force –remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted. Correct Answer: AB

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group. Correct Answer: ACE

Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage Correct Answer: C

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.) Correct Answer: /etc/skel

lpic-102-q3.txt · Última modificación: por 127.0.0.1