Username: Username of the account (matches username in /etc/passwd) Show
Password: Encrypted password for the account Last Change: Last time password was changed Min: Minimum # of days between password changes Max: Max # of days password is valid Warn: Number of days before password expiry in the system warns the user Inactive: Grace period in which user's password can be changed Expire: Number of days when user accounts will expire (from January 1, 1970) Reserved: Currently not used, this field is reserved for future use Recommended textbook solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (40)The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in? test $USERS eq 5 Given the following script: while [ ! f /tmp/foo ]; do echo n . process_data > /tmp/foodone *If
file /tmp/foo exists, process_data won"t be run. A conditional that lets you make multiple comparisons with a pattern is called: case What is the meaning of $(( $i + 1)) ? 1 will be added to the i variable How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5? test d /tmp/foo o $USERS gt 5 A division of a hard drive may be referred to as a _______ . partition slice Which of the following are valid partitioning types? MBR GPT The fdisk command is a tool used for working with the MBR partitioned disks. True 8. Which of the following is the valid device file name for the first IDE hard drive on the system? /dev/hda Which of the following are valid video cable connector types? DVI VGA A command that will continuously update statistics about running processes: top The following are valid Linux option styles: *Traditional Unix with a single dash (-) Which file contains the information passed to the kernel at boot time? /proc/cmdline To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it: /etc/sysctl.conf To get a list of all packages installed on a system using RPM Package Management you can execute: rpm -qa Which of the following would be considered a host? A printer attached to the network via an IP address What option to the netstat command has information shown as numbers rather than names? -n Which of the following commands will allow you to log into the machine server1 with the account name nick? ssh nick@server1 The RSA key fingerprint allows the dig command to connect to remote systems. False 19 Which files contain user account information? /etc/passwd /etc/shadow Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users. True 21 In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if ther were executed by the root user True 22 Which of the following commands will display how long the system has been running since the last boot? w uptime The /etc/shadow file contains plain-text passwords. False 24 Which command can be used to view the /etc/passwd file entries? getent Which command can be used to determine a user's most recent log in? last Which of the following files contains encrypted user password information? /etc/shadow Which of the following files contains user IDs? /etc/passwd Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified? /etc/group Which of the following commands, run as root, will prevent the user bob from logging in? usermod -L bob The chmod command can be used on a file by: The file owner and root Which option for the chown command can be used to change the owner of a directory and all the files and directories below it? -R The chown command will only accept one file at a time as an argument. False 33 The "execute" permission is never set on files by default. True 34 The user owner of a file will always have the same or higher permissions as "other". False 35 A source and a hard link must be part of the same filesystem. True 36 Deleting a source file will break an associated symbolic link. True 37 A source file and a symbolic link must be part of the same file system. False 38 Which of the following commands would create a hard link, link to file? ln file link Which of the following commands would create a symbolic link, link to file? ln -s file link Students also viewed1534 terms jjiiiiiii Linux Essentials - Chapter Exam 1319 terms Moodsy KT - Linux Essentials | Chapter X||| [Exam]22 terms syxVentex Linux Essentials 2.0 Final Comprehensive Exam (Cha…70 terms
fantastickorni Sets found in the same folderNDG Linux Essentials Midterm40 terms gsporter NDG Linux Essentials -Ch 1213 terms gsporter Linux Essentials Final Comprehensive Exam163 terms gsporter NDG Linux Essentials -Ch 1615 terms gsporter Other sets by this creatorCisco CCNA CyberOps Associate (Version 1.0) All Mo…294 terms gsporter CyberOps Associate Cert Study Guide109 terms gsporter Printers: CompTIA A+ 220-100111 terms gsporter SkillsUSA Prep938 terms gsporter Verified questionscomputer science Why are divide-and-conquer algorithms often very efficient? Verified answer computer science Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50. Verified answer
computer science Explain why the statement, “The running time of algorithm A is at least O(n²)," is meaningless. Verified answer
computer science Describe an efficient algorithm that, given a set $$ [x_1, x_2, ..., x_n] $$ of points on the real line, determines the smallest set of unit-length closed intervals that contains all of the given points. Argue that your algorithm is correct. Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Other Quizlet setsScience Quiz // Engineering Design Process13 terms law1106 ERS Final Exam92 terms hannah_deschenes Chapter 3 Quiz20 terms madi30068 Econ Review60 terms richardsonka34 What command can an administrator use to change the password of an existing user account quizlet?Chmod (Change Mode) allows the user to change the access (mode) of a file to read, write, execute, or a combination of those permissions. The passwd (password) command is used to change a Linux user's password. The chown (Change Owner) command is used to modify the file owner or group owner assignment.
Which command can you issue to find out which user account you are currently using?12.1.
You may invoke whoami to determine your current username and, hence, which computer you are using. You might also use whoami when sharing a terminal with other users. If the shared terminal has been left unattended, you can issue whoami to list the name of the user who is currently logged in.
Which command enables an authorized user to log in to a system with their own credentials and then to become the root user to perform administrative tasks?Which command enables a user to log in to a system with their own credentials, and then to become the root user to perform administrative tasks? Su - The su command enables an authorized user to become the root user.
Which command would you use to unlock a user account?Option 1: Use the command “passwd -u username”. Unlocking password for user username. Option 2: Use the command “usermod -U username”.
|