Username: Username of the account (matches username in /etc/passwd)
Password: Encrypted password for the account
Last Change: Last time password was changed
Min: Minimum # of days between password changes
Max: Max # of days password is valid
Warn: Number of days before password expiry in the system warns the user
Inactive: Grace period in which user's password can be changed
Expire: Number of days when user accounts will expire (from January 1, 1970)
Reserved: Currently not used, this field is reserved for future use
Recommended textbook solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (40)
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5
Given the following script: while [ ! f /tmp/foo ]; do echo n . process_data > /tmp/foodone
*If
file /tmp/foo exists, process_data won"t be run.
*process_data will be called at most once.
A conditional that lets you make multiple comparisons with a pattern is called:
case
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
test d /tmp/foo o $USERS gt 5
A division of a hard drive may be referred to as a _______ .
partition slice
Which of the following are valid partitioning types?
MBR GPT
The fdisk command is a tool used for working with the MBR partitioned disks.
True 8.
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
Which of the following are valid video cable connector types?
DVI VGA
A command that will continuously update statistics about running processes:
top
The following are valid Linux option styles:
*Traditional Unix with a single dash (-)
*BSD Unix without a dash
*GNU long options with two dashes (--)
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
Which of the following would be considered a host?
A printer attached to the network via an IP address
What option to the netstat command has information shown as numbers rather than names?
-n
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1
The RSA key fingerprint allows the dig command to connect to remote systems.
False 19
Which files contain user account information?
/etc/passwd /etc/shadow
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True 21
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if ther were executed by the root user
True 22
Which of the following commands will display how long the system has been running since the last boot?
w uptime
The /etc/shadow file contains plain-text passwords.
False 24
Which command can be used to view the /etc/passwd file entries?
getent
Which command can be used to determine a user's most recent log in?
last
Which of the following files contains encrypted user password information?
/etc/shadow
Which of the following files contains user IDs?
/etc/passwd
Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified?
/etc/group
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
The chmod command can be used on a file by:
The file owner and root
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R
The chown command will only accept one file at a time as an argument.
False 33
The "execute" permission is never set on files by default.
True 34
The user owner of a file will always have the same or higher permissions as "other".
False 35
A source and a hard link must be part of the same filesystem.
True 36
Deleting a source file will break an associated symbolic link.
True 37
A source file and a symbolic link must be part of the same file system.
False 38
Which of the following commands would create a hard link, link to file?
ln file link
Which of the following commands would create a symbolic link, link to file?
ln -s file link
Students also viewed15
34 terms
jjiiiiiii
Linux Essentials - Chapter Exam 13
19 terms
Moodsy
KT - Linux Essentials | Chapter X||| [Exam]
22 terms
syxVentex
Linux Essentials 2.0 Final Comprehensive Exam (Cha…
70 terms
fantastickorni
Sets found in the same folderNDG Linux Essentials Midterm
40 terms
gsporter
NDG Linux Essentials -Ch 12
13 terms
gsporter
Linux Essentials Final Comprehensive Exam
163 terms
gsporter
NDG Linux Essentials -Ch 16
15 terms
gsporter
Cisco CCNA CyberOps Associate (Version 1.0) All Mo…
294 terms
gsporter
CyberOps Associate Cert Study Guide
109 terms
gsporter
Printers: CompTIA A+ 220-1001
11 terms
gsporter
SkillsUSA Prep
938 terms
gsporter
Verified questionscomputer science
Why are divide-and-conquer algorithms often very efficient?
Verified answer
computer science
Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50.
Verified answer
computer science
Explain why the statement, “The running time of algorithm A is at least O(n²)," is meaningless.
Verified answer
computer science
Describe an efficient algorithm that, given a set $$ [x_1, x_2, ..., x_n] $$ of points on the real line, determines the smallest set of unit-length closed intervals that contains all of the given points. Argue that your algorithm is correct.
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Other Quizlet setsScience Quiz // Engineering Design Process
13 terms
law1106
ERS Final Exam
92 terms
hannah_deschenes
Chapter 3 Quiz
20 terms
madi30068
Econ Review
60 terms
richardsonka34