Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)
Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)
On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)
Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory.
Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote
What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12
Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd –rotate D. logrotate E. logger
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x
Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit
Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod
Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow
Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow
Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh
What is true regarding the command userdel –force –remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted.
Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group.
Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage
By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)
respuestas
Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.) Correct Answer: groupadd, /usr/sbin/groupadd
Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.) Correct Answer: /etc/hosts.allow
On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.) Correct Answer: /etc/shadow
Which of the following steps prevents a user from obtaining an interactive login session? A. Run the command chsh -s /bin/false with the user name. B. Set the UID for the user to 0. C. Remove the user from the group staff. D. Add the user to /etc/noaccess. E. Create a .nologin file in the user's home directory. Correct Answer: A
Which of the following are syslog facilities? (Choose TWO correct answers.) A. local7 B. mail C. advanced D. postmaster E. remote Correct Answer: AB
What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12 Correct Answer: A
Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. striplog C. syslogd –rotate D. logrotate E. logger Correct Answer: D
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? A. * B. - C. s D. x Correct Answer: D
Which command can be used to delete a group from a Linux system? A. groupdel B. groupmod C. groups D. groupedit Correct Answer: A
Which of the following commands can remove a user from a group? A. grouprm B. groupmod C. passwd D. usergroups E. usermod Correct Answer: E
Which file contains the date of the last change of a user's password? A. /etc/gshadow B. /etc/passwd C. /etc/pwdlog D. /etc/shadow E. /var/log/shadow Correct Answer: D
Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow Correct Answer: D
Which commands can be used to change a user's account aging information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh Correct Answer: ABD
What is true regarding the command userdel –force –remove bob? (Choose TWO correct answers.) A. The user bob is removed from the system's user database. B. The user bob's home directory is removed. C. The locate database is updated to drop files owned by bob. D. All files owned by bob are remove from all mounted filesystems. E. In case bob was the last member of a group, that group is deleted. Correct Answer: AB
Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.) A. The list of users that belong to the group. B. The home directory of the group. C. The name of the group. D. The description of the group. E. The password of the group. Correct Answer: ACE
Which of the following commands can be used to limit the amount of memory a user may use? A. umask B. usermod C. ulimit D. passwd E. chage Correct Answer: C
By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.) Correct Answer: /etc/skel
