What commands would grant additional users access to use the Sudo command quizlet?

Username: Username of the account (matches username in /etc/passwd)

Password: Encrypted password for the account

Last Change: Last time password was changed

Min: Minimum # of days between password changes

Max: Max # of days password is valid

Warn: Number of days before password expiry in the system warns the user

Inactive: Grace period in which user's password can be changed

Expire: Number of days when user accounts will expire (from January 1, 1970)

Reserved: Currently not used, this field is reserved for future use

Recommended textbook solutions

What commands would grant additional users access to use the Sudo command quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (40)

The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?

test $USERS eq 5

Given the following script: while [ ! f /tmp/foo ]; do echo n . process_data > /tmp/foodone

*If file /tmp/foo exists, process_data won"t be run.
*process_data will be called at most once.

A conditional that lets you make multiple comparisons with a pattern is called:

case

What is the meaning of $(( $i + 1)) ?

1 will be added to the i variable

How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?

test d /tmp/foo o $USERS gt 5

A division of a hard drive may be referred to as a _______ .

partition slice

Which of the following are valid partitioning types?

MBR GPT

The fdisk command is a tool used for working with the MBR partitioned disks.

True 8.

Which of the following is the valid device file name for the first IDE hard drive on the system?

/dev/hda

Which of the following are valid video cable connector types?

DVI VGA

A command that will continuously update statistics about running processes:

top

The following are valid Linux option styles:

*Traditional Unix with a single dash (-)
*BSD Unix without a dash
*GNU long options with two dashes (--)

Which file contains the information passed to the kernel at boot time?

/proc/cmdline

To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:

/etc/sysctl.conf

To get a list of all packages installed on a system using RPM Package Management you can execute:

rpm -qa

Which of the following would be considered a host?

A printer attached to the network via an IP address

What option to the netstat command has information shown as numbers rather than names?

-n

Which of the following commands will allow you to log into the machine server1 with the account name nick?

ssh nick@server1

The RSA key fingerprint allows the dig command to connect to remote systems.

False 19

Which files contain user account information?

/etc/passwd /etc/shadow

Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.

True 21

In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if ther were executed by the root user

True 22

Which of the following commands will display how long the system has been running since the last boot?

w uptime

The /etc/shadow file contains plain-text passwords.

False 24

Which command can be used to view the /etc/passwd file entries?

getent

Which command can be used to determine a user's most recent log in?

last

Which of the following files contains encrypted user password information?

/etc/shadow

Which of the following files contains user IDs?

/etc/passwd

Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified?

/etc/group

Which of the following commands, run as root, will prevent the user bob from logging in?

usermod -L bob

The chmod command can be used on a file by:

The file owner and root

Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?

-R

The chown command will only accept one file at a time as an argument.

False 33

The "execute" permission is never set on files by default.

True 34

The user owner of a file will always have the same or higher permissions as "other".

False 35

A source and a hard link must be part of the same filesystem.

True 36

Deleting a source file will break an associated symbolic link.

True 37

A source file and a symbolic link must be part of the same file system.

False 38

Which of the following commands would create a hard link, link to file?

ln file link

Which of the following commands would create a symbolic link, link to file?

ln -s file link

Students also viewed

15

34 terms

jjiiiiiii

Linux Essentials - Chapter Exam 13

19 terms

Moodsy

KT - Linux Essentials | Chapter X||| [Exam]

22 terms

syxVentex

Linux Essentials 2.0 Final Comprehensive Exam (Cha…

70 terms

fantastickorni

Sets found in the same folder

NDG Linux Essentials Midterm

40 terms

gsporter

NDG Linux Essentials -Ch 12

13 terms

gsporter

Linux Essentials Final Comprehensive Exam

163 terms

gsporter

NDG Linux Essentials -Ch 16

15 terms

gsporter

Other sets by this creator

Cisco CCNA CyberOps Associate (Version 1.0) All Mo…

294 terms

gsporter

CyberOps Associate Cert Study Guide

109 terms

gsporter

Printers: CompTIA A+ 220-1001

11 terms

gsporter

SkillsUSA Prep

938 terms

gsporter

Verified questions

computer science

Why are divide-and-conquer algorithms often very efficient?

Verified answer

computer science

Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50.

Verified answer

computer science

Explain why the statement, “The running time of algorithm A is at least O(n²)," is meaningless.

Verified answer

computer science

Describe an efficient algorithm that, given a set $$ [x_1, x_2, ..., x_n] $$ of points on the real line, determines the smallest set of unit-length closed intervals that contains all of the given points. Argue that your algorithm is correct.

Verified answer

Recommended textbook solutions

What commands would grant additional users access to use the Sudo command quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

What commands would grant additional users access to use the Sudo command quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Science Quiz // Engineering Design Process

13 terms

law1106

ERS Final Exam

92 terms

hannah_deschenes

Chapter 3 Quiz

20 terms

madi30068

Econ Review

60 terms

richardsonka34

What command can an administrator use to change the password of an existing user account quizlet?

Chmod (Change Mode) allows the user to change the access (mode) of a file to read, write, execute, or a combination of those permissions. The passwd (password) command is used to change a Linux user's password. The chown (Change Owner) command is used to modify the file owner or group owner assignment.

Which command can you issue to find out which user account you are currently using?

12.1. You may invoke whoami to determine your current username and, hence, which computer you are using. You might also use whoami when sharing a terminal with other users. If the shared terminal has been left unattended, you can issue whoami to list the name of the user who is currently logged in.

Which command enables an authorized user to log in to a system with their own credentials and then to become the root user to perform administrative tasks?

Which command enables a user to log in to a system with their own credentials, and then to become the root user to perform administrative tasks? Su - The su command enables an authorized user to become the root user.

Which command would you use to unlock a user account?

Option 1: Use the command “passwd -u username”. Unlocking password for user username. Option 2: Use the command “usermod -U username”.