Linux+ Guide to Linux Certification Chapter 11 Review Answers by NMarrello

VIEWS: 2,626 PAGES: 6

More Info
									                       Guide to Linux+ (2nd Edition)
                           ISBN 0-619-21621-2
                        End of Chapter Solutions

Chapter 11 Solutions
Review Questions
  1. The process of sending print jobs from the print queue to the printer is called?
          a. spooling
          b. queuing
          c. redirecting
          d. printing
  Answer: d
  2. You can clear a log file simply by redirecting nothing in to it. True or False?
  Answer: True
  3. When a printer is disabled, ________.
          a. the print queue does not accept jobs and sends a message to the user noting that the
               printer is unavailable
          b. the print queue does accept jobs into the print queue and holds them there until the printer
               is enabled again
          c. the printer appears as off-line when a lp request is sent
          d. the print queue redirects all print jobs sent to it to /dev/null
  Answer: b
  4. What is the name used to describe a user providing a user name and password to log in to a
     system?
          a. validation
          b. authorization
          c. login
          d. authentication
  Answer: b
  5. Which command can you use to lock a user account?
          a. lock username
          b. secure username
          c. usermod –L username
          d. useradd –L username
  Answer: c
  6. Which command can be used to alter the primary group associated with a given user temporarily?
          a. usermod
          b. chggrp
          c. gpasswd
          d. newgrp
  Answer: d
  7. Which command can be used to send a print job to the default printer named Printer1? (Choose all
     that apply.)
          a. lp –d Printer1 file
          b. lp Printer1 file
          c. lp file
          d. lp –m Printer1 file
  Answer: a, c
  8. What is the name of the file that contains a listing of all users on the system and their home
     directories?
          a. /etc/passwd



                                                  1
         b. /etc/users
         c. /etc/shadow
         d. /etc/password
Answer: a
9. UIDs and GIDs are unique to the system and once used can never be reused. True or False?
Answer: False
10. What is the name of the utility used to rotate log files?
         a. syslog
         b. jetpack
         c. logrotate
         d. logbackup
Answer: c
11. You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd.
    True or False?
Answer: True
12. When a printer is rejecting requests,____________.
         a. the print queue does not accept jobs and sends a message to the user noting that the
             printer is unavailable
         b. the print queue does accept jobs into the print queue and holds them there until the printer
             is accepting requests again
         c. the printer appears as off-line when a lp request is sent
         d. the print queue redirects all print jobs sent to it to /dev/null
Answer: a
13. When referring to the /etc/syslog.conf file, __________ specifies information from a certain area
    of the system, whereas ________ is the level of importance of that information.
         a. section, priority
         b. service, precedents
         c. process, degree
         d. facility, priority
Answer: d
14. Most log files on the system are found in which directory?
         a. /etc/logfiles
         b. /etc/log
         c. /var/log
         d. /dev/log
Answer: c
15. Which file contains default information such as UID and GID ranges and minimum password
    length to be used at user creation?
         a. /etc/skel
         b. /etc/passwd
         c. /etc/login.defs
         d. /etc/default/useradd
Answer: c
16. What is the background process responsible for printing on Red Hat Fedora Linux?
         a. lp
         b. cupsd
         c. lpd
         d. lpstat
Answer: b
17. Which command would you use to unlock a user account?
         a. unlock username
         b. open username
         c. usermod –U username
         d. useradd –U username
Answer: c




                                                 2
    18. Along with a listing of user accounts, the /etc/passwd file also contains information on account
        expiry. True or False?
    Answer: False
    19. You use lpstat and determine that a user named User1 has placed two large print jobs in the queue
        for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21,
        respectively. Which command would you use to remove these two jobs from the print queue?
             a. cancel Printer1-17 Printer1-21
             b. cancel –u Printer1-17 Printer1-21
             c. cancel –a Printer1-17 Printer1-21
             d. cancel 17 21
    Answer: a
    20. Which command is used to delete a user account?
             a. usermod –d username
             b. del username
             c. userdel username
             d. rm username
    Answer: c

Project 11-1
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Not available.
Step 5: Not available.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Yes.
Step 10: Not available.
Step 11: Not available.
Step 12: Not available.
Step 13: Not available.

Project 11-2
Step 1: Not available.
Step 2: Yes, yes.
Step 3: Not available.
Step 4: Not available.
Step 5: p1-1.
Step 6: Not available.
Step 7: p1-2.
Step 8: Not available.
Step 9: Not available.
Step 10: Not available.
Step 11: No.
Step 12: Not available.
Step 13: Yes.
Step 14: Not available.
Step 15: Not available.

Project 11-3
Step 1: Not available.
Step 2: Socket; syslog daemon; centralizes logging.
Step 3: /var/log/cron.
Step 4: Not available.



                                                      3
Step 5: Not available.
Step 6: Not available.
Step 7: Information about cron daemon startup is displayed on the last line.
Step 8: 4:02 A.M..
Step 9: Weekly; 4.
Step 10: 20; yes.
Step 11: 31.
Step 12: Not available (answers will vary).
Step 13: Not available.

Project 11-4
Step 1: Not available.
Step 2: Top; bottom; 37.
Step 3: root; root; everyone (mode=644).
Step 4: Encrypted password; !!
Step 5: root; root; only the root user (password security – mode=400).
Step 6: File does not exist because all information is now stored in /etc/passwd.
Step 7: Encrypted password.
Step 8: Configures system to store password information in the /etc/shadow file.
Step 9: Not available.
Step 10: /bin/bash; /etc/skel; /home.
Step 11: Hidden environment files and directories; all files are copied to new user home directories to
provide environment variables and files.
Step 12: Not available.
Step 13: makes the home directory; /etc/default/useradd.
Step 14: /bin/bash; /home/bozo; 501.
Step 15: No; no.
Step 16: Not available.
Step 17: All files in Step 11 are present plus the inittab file.
Step 18: Not available.

Project 11-5
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Only the login name changed.
Step 5: Not available.
Step 6: Yes.
Step 7: The 7th field.
Step 8: The 9th field; the number of days since January 1, 1970.
Step 9: The 4th field.
Step 10: The 5th field.
Step 11: The 4th field.
Step 12: Not available.

Project 11-6
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: a ! was placed at the beginning.
Step 5: No.
Step 6: Not available.
Step 7: Not available.
Step 8: They are identical.
Step 9: Yes.
Step 10: Not available.


                                                     4
Step 11: Not available.
Step 12: /bin/false is not listed in /etc/shells; yes.
Step 13: No.
Step 14: Not available.
Step 15: Not available.
Step 16: Yes.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.

Project 11-7
Step 1: Not available.
Step 2: bozo; users typically manage their own files.
Step 3: No.
Step 4: 666.
Step 5: Makes a home directory and assigns a UID.
Step 6: Not available.
Step 7: /home/bozoette; 666.
Step 8: bozoette; yes.
Step 9: Not available.

Project 11-8
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: bozoette, groupies.
Step 5: bozoettee directory and assigns a UID.
Step 6: Not available.
Step 7: bozoette, bozoette because bozoette is the owner and bozoette is the primary group.
Step 8: Not available.
Step 9: Not available.
Step 10: bozoette, groupies because bozoette is the owner and groupies is the primary group.
Step 11: Not available.
Step 12: Not available.
Step 13: /etc/group.
Step 14: Not available.

Discovery Exercises
Discovery Exercise 1
a) kern.=crit       /var/log/alert
b) user.*           /var/log/userlog
c) lpr.debug        /var/log/printer
d) mail.*;mail.!=notice       /var/log/mailman
e) *.=alert;*.=crit           /var/log/serious
f) kern,lpr.=warn; kern,lpr.=error /var/log/shared

Discovery Exercise 2
The –D option modifies /etc/default/useradd to set default options for future account additions. The
command used to set the expiry for all new accounts is useradd –D –e "2015-03-05".

Discovery Exercise 3
Add the entry:
           *.warn /var/log/sample.log"
to the /etc/syslog.conf file.



                                                         5
Add the entries:
          /var/log/sample.log {
                    compress
                    daily
                    rotate 6
          }
to either the /etc/logrotate.conf file or a new file in the /etc/logrotate.d directory.

Discovery Exercise 4
Not available.

Discovery Exercise 5
Not available.

Discovery Exercise 6
a) useradd –u 733 –c "accounting manager" –p Gxj234 bsmith
b) userdel jdoe
c) usermod –c "shipping" – e "2011-03-23"
d) passwd –l wjenkins (answers will vary!)
e) passwd bsmith (specify the correct password)
f) usermod –l wjones –G managers tbanks
g) useradd –u 0 –g root –o –r wjones
h) useradd –p he789R jdoe
i) usermod –g root wsmith
j) usermod –G acctg joe ; usermod –G acctg tbanks




                                                         6

								
To top