• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/171

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

171 Cards in this Set

  • Front
  • Back
(8) What are the three main features of UNIX?
1. Multi-user<br/>2. Multi-tasking<br/>3. Portability
(8) Which feature of UNIX is described by more than one user being able to use the machine at a time?
Multi-user
(8) Which feature of UNIX is described by more than one program being able to be run at once?
Multi-tasking
(8) Which feature of UNIX is described as being able to support many different hardware platforms, Intel desktops, Sparc workstations, IBM mainframes, etc.?
Portability
(8) What are the three components of the UNIX Operating System?
1. Kernel<br/>2. Shell<br/>3. File System
(8) Which component of the UNIX Operating System schedules tasks, manages data/files access and storage, enforces security mechanisms, and performs all hardware access?
Kernel
(8) Which component of the UNIX Operating System presents each user with a prompt, executes user commands, and supports a custom environment for each user?
Shell
(8) What are the four UNIX Shells?
1. Bourne shell (sh)<br/>2. Korn shell (ksh)<br/>3. C shell (csh)<br/>4. Bourne-Again shell (bash)<br/>
(8) Which component of the UNIX Operating system refers to the way in which UNIX implements files and directories?
File system
(9) All UNIX files are stored in a hierarchical structure with all directories being subordinate to the __________ directory.
root (“/”)
(9) How are files treated in UNIX?
As byte streams
(9) Having spaces in a UNIX file name can cause some problems. To avoid these problems, what is strongly recommended?
Underscores (“_”)
(9) What are the three privilege levels for files in a UNIX file system?
1. Read<br/>2. Write<br/>3. Execute
(9) How are hardware devices treated in the UNIX file structure?
They are treated just like files
(10) Which UNIX directory is at the top of the hierarchical tree?
root(“/”)
(10) Which UNIX directory contains the kernel?
root (“/”)
(10) Which UNIX directory contains executable programs used at the command line such as ls, mkdir, cp, etc.?
/bin
(10) Which UNIX directory is referred to as binary?
/bin
(10) Which UNIX directory contains block and device files?
/dev
(10) Which UNIX directory contains system administration and configuration files?
/etc
(10) Which UNIX directory contains stores of users’ home directories?
/home
(10) Which UNIX directory contains processes and other system information in a hierarchical file-like structure, which provides an easy way to access process data held in the kernel?
/proc
(10) Which UNIX directory contains temporary files used by the system?
/tmp
(10) Which UNIX directory contains programs utilized to boot the system?
/sbin
(10) What are the two types of paths used in UNIX file structures?
1. Absolute path<br/>2. Relative path
(10) Which pathname uniquely identifies a file by providing the full pathname of the file beginning with the root “/” directory and could look like:<br/>cd/users/stu10/UNIX
Absolute pathname
(10) Which pathname allows users to take shortcuts to access files rather than specifying a full pathname?
Relative pathname
(10) Which pathname allows users to access a file by specifying its path relative to the working directory?
Relative pathname
(11) Commands in UNIX are kept small, but each command is extended by using switch options. How are switch options identified when using UNIX commands?
“-“
(11) What is the typical anatomy of a UNIX command?
Command switch/option argument
(11) Are UNIX commands case sensitive?
No
(11) Which UNIX command displays on-line manual pages about identified commands?
man
(12) What are the two things the user must know when accessing a UNIX system?
1. What type of system are you on<br/>2. Where you are on that system
(12) What UNIX command is used to print system information?
uname
(12) What will the following UNIX command produce: uname –a
print all system information about the current UNIX system
(12) What UNIX command displays the name of the present working directory?
pwd
(12) Which UNIX file system manipulation command lists directory contents in a tree-like format?
tree
(12) Which UNIX file system manipulation command lists the contents of a directory?
ls
(12) What will the following UNIX command produce: ls –a
lists the contents of a directory including all files including invisible files
(12) What will the following UNIX command produce: ls –l
lists the contents of a directory in long list format (shows ownership, permissions, and links)
(12) What will the following UNIX command produce: ls –i
lists the contents of a directory and the inode number in the first field
(12) What will the following UNIX command produce: ls –s
lists the contents of a directory and displays the total number of file system blocks used by the file
(12) Which UNIX file system manipulation command makes a link between files or directories?
ln
(12) What will the following UNIX command produce: ln –s
creates a symbolic link
(13) Which UNIX file system manipulation command changes working directories?
cd
(13) Which UNIX file system manipulation command creates a directory?
mkdir
(13) What will the following UNIX command produce: mkdir –p
creates a directory where no parent directory exists
(13) Which UNIX file system manipulation command creates an empty file?
touch
(13) What will the following UNIX command produce: touch –t
manipulates the file’s access date/time stamp
(13) Which UNIX file system manipulation command removes an empty directory?
rmdir
(13) Which UNIX file system manipulation command copies files?
cp
(13) Which UNIX file system manipulation command moves files?
mv
(13) Which UNIX file system manipulation command creates a record of the session for that terminal window?
script
(13) Which UNIX file system manipulation command removes a file?
rm
(13) What will the following UNIX command produce: rm –r
removes a directory and all files within it
(13) Which UNIX file system manipulation command displays the file on the screen and is also used to concatenate (combine) files?
cat
(13) Which UNIX file system manipulation command displays the file contents one screen at a time?
more
(14) Which UNIX file system manipulation command displays the file contents one screen at a time but has additional options allowing backwards movement and the initiation of a search?
less
(14) Which UNIX file system manipulation command displays the first few (typically 10) lines of a file?
head
(14) Which UNIX file system manipulation command displays the last few (typically 10) lines of a file?
tail
(14) Which UNIX file system manipulation command locates files having certain characteristics, which are specified?
find
(14) What will the following UNIX command produce: find –name
locates a file with the specified name
(14) Which UNIX file system manipulation command searches a file or files for lines that contain strings of a certain pattern?
Grep
(18) What is the only user account installed on a UNIX system during installation?
The administrator or “superuser” account named “root”
(18) Nearly all security restrictions are bypassed for any program that is executed by the user __________.
root
(18) T/F? The “root” account is an account designated for the personal use of the system administrator.
False, it is not designated for the personal use of the system administrator
(18) What is the main security weakness of UNIX?
“root”; most attackers who break into a UNIX system try to become the superuser
(18) Which UNIX user account command creates a new user or updates default new user information?
useradd
(18) What will the following UNIX command produce: useradd –d
creates a new user account and specifies the path of the home directory for the user
(18) What will the following UNIX command produce: useradd –m
creates a new user account and creates the new home directory for the user if it doesn’t already exist (the –m switch option is used in conjunction with the –d switch option)
(18) Which UNIX user account command deletes a user account and related files?
userdel
(18) What will the following UNIX command produce: userdel –r
deletes a user account and completely removes the home directory for the user
(18) What UNIX user account command enables the user or system administrator to change the password for users?
passwd
(18) Which UNIX user account command is used to change from the current user account to another, which is commonly used to switch to root user to perform functions requiring root privileges?
su
(18) Which UNIX user account command allows users to share files or programs without giving access to all system users and is also used to identify the groups a user belongs to?
groups
(19) Which UNIX process related command displays a snapshot status of all active processes that your terminal controls?
ps
(19) What UNIX term refers to the instance of a running program?
process
(19) What will the following UNIX command produce:
ps –e
(19) What will the following UNIX command produce: ps –f
generates a list of active processes in full mode format
(19) What UNIX process related command entirely eliminates or stops a process?
kill
(19) What will the following UNIX command produce: kill -9
used to kill a stubborn process
(19) What will the following UNIX command produce: kill –HUP
used to immediately re-spawn a killed process or to effect configuration changes
(19) Which UNIX networking command is used to view and set the characteristics of the network interface?
ifconfig
(19) What will the following UNIX command produce: ifconfg –a
displays information about all interfaces on a system
(19) Which UNIX networking command shows or manipulates the IP routing table?
route
(19) Which UNIX networking command sends ICMP packets to another device to see if it is alive/up?
ping
(20) Which UNIX forensics command determines the type of file?
file
(20) Which UNIX forensics command prints the strings of printable characters in a file?
strings
(20) Which UNIX forensics command is a multipurpose command used to view network status and activity?
netstat
(20) What will the following UNIX command produce: netstat –rn
displays the system’s current routing tables
(20) What will the following UNIX command produce: netstat –a
displays all connections broken out by UDP and TCP
(20) Which UNIX forensics command displays information about the system users?
finger
(20) What will the following UNIX command produce: finger –l
displays user information in long file format
(20) Which UNIX command shows the path for executing commands?
which
(20) Which UNIX command clears the screen?
clear
(20) Which UNIX command displays or changes the current date/time?
date
(20) Which UNIX command displays who’s logged in?
who
(20) Which UNIX command displays information about who is logged in and their processes?
w
(20) Which UNIX command displays who you’re logged in as?
whoami
(21) Which UNIX command reports the amount of free disk space available on the specified file system?
df
(21) Which UNIX command displays mounted devices or is used to mount devices?
mount
(21) Which UNIX command allows remote login using secure shell protocol?
ssh
(21) Which UNIX command is used to transfer files using the ssh protocol?
scp
(21) Which UNIX command is used to chain commands where the output of one command is the input of the next command?
| (pipe)
(21) Which UNIX command is the most often method of initiating a system shutdown?
shutdown
(21) Which UNIX command is the safest, most considerate, and most thorough method to initiate a halt, reboot, or return to single-user mode?
shutdown
(21) Which UNIX command restarts the system?
reboot
(29) What are the three classes of UNIX file permissions?
1. Owner<br/>2. Group<br/>3. Other
(29) Which UNIX file permission class is the actual owner of the file or directory?
Owner
(29) Which UNIX file permission class denotes group ownership of a file or directory?
Group
(29) Which UNIX file permission class includes all other users on a system?
Other
(29) Given the following:<br/>-rw-r--r--<br/>What does the first character represent?
An ordinary file
(29) Given the following:<br/>drw-r--r--<br/>What does the first character represent?
A directory file
(29) Given the following:<br/>brw-r--r--<br/>What does the first character represent?
A special block file
(29) Given the following:<br/>crw-r--r--<br/>What does the first character represent?
A special character file
(29) Given the following:<br/>lrw-r--r--<br/>What does the first character represent?
A symbolic link, which points to another file
(29) Given the following:<br/>drw-r--r--<br/>What are the permissions of the owner or user?
Read and Write
(29) Given the following:<br/>drw-r--r--<br/>What are the permissions of the group?
Read
(29) Given the following:<br/>drw-r--r--<br/>What are the permissions of all other users on the system?
Read
(29) Define the meaning of the following field related to the output produced by using the ls –al command:<br/><table width="100%" border="0"><tr align="center"><td>-rw-r--r--</td><td>1</td><td>root</td><td>sys</td><td>1256</td><td>Jun 27 10:59</td><td>motd</td></tr><tr align="center"><td>1</td><td>2</td><td>3</td><td>4</td><td>5</td><td>6</td><td>7</td></tr></table>
1. User/Group/Other Permissions<br/>2. The number of links to the file<br/>3. The owner of the file<br/>4. The group<br/>5. Size of the file<br/>6. Date and Time of creation or modification<br/>7. Name of the file
(30) What are the three UNIX file permission definitions?
1. Read<br/>2. Write<br/>3. Execute
(30) Which UNIX file permission definition allows an authorized user to view the contents of a file?
Read
(30) Which UNIX file permission definition allows an authorized user to alter the contents of a file?
Write
(30) Which UNIX file permission definition allows an authorized user to execute the file as a program?
Execute
(31) What UNIX command sets permissions for files and directories?
chmod
(31) What are the two methods used to change file and directory permissions?
1. Numerical<br/>2. Symbolic
(31) Which method of changing file and directory permissions utilizes octal code to specify three octal digits; one for owner, group, and other?
Numerical
(31) What is the octal value for read when using the numerical method of changing file and directory permissions?
4
(31) What is the octal value for write when using the numerical method of changing file and directory permissions?
2
(31) What is the octal value for executed when using the numerical method of changing file and directory permissions?
1
(31) What is the result of the following UNIX command: chmod 764 /etc/test
the permissions for the test file in the /etc directory were changed to “rwxrw-r--"
(31) Which method of changing permissions for files and directories utilizes Alpha representation to assign permissions?
Symbolic
(31) What is the value for read when using the symbolic method of changing file and directory permissions?
r
(31) What is the value of write when using the symbolic method of changing file and directory permissions?
w
(31) What is the value of executed when using the symbolic method of changing file and directory permissions?
x
(31) What is the value of user or owner when using the symbolic method of changing file and directory permissions?
u
(31) What is the value of group when using the symbolic method of changing file and directory permissions?
g
(31) What is the value of other when using the symbolic method of changing file and directory permissions?
o
(31) What value represents ‘add to existing permissions’ when using the symbolic method of changing file and directory permissions?
+
(31) What value represents ‘remove permissions’ when using the symbolic method of changing file and directory permissions?
-
(31) What value represents ‘set permissions exactly’ when using the symbolic method of changing file and directory permissions?
=
(35) What two files do UNIX variants keep information about users and their passwords in?
1. /etc/passwd<br/>2. /etc/shadow
(35) Which UNIX file contains a line for each user and login name utilized by the system?
/etc/passwd
(35) Define the fields associated with the following /etc/passwd file:<br/><table border=”1”><tr align=”center”><td>bob:</td><td>x:</td><td>100:</td><td>1:</td><td>JimBob:</td><td>/home/bob:</td><td>/bin/sh</td></tr><tr align=”center”><td>1</td><td>2</td><td>3</td><td>4</td><td>5</td><td>6</td><td>7</td></tr></table>
1. bob: = user name<br/>2. x: = placeholder for the encrypted password that is stored in the /etc/shadow file<br/>3. 100: = User Identification (UID)<br/>4. 1: = Group Identification (GID)<br/>5. JimBob: = Comments, normally contains the users full name, office number, and phone numbers<br/>6. /home/bob: = the user’s home path directory<br/>7. /bin/sh = the user’s default login shell
(36) What are the six default login names used by the system for its operation and system administration?
1. daemon<br/>2. bin<br/>3. adm<br/>4. lp<br/>5. uucp<br/>6. nobody
(36) Where, in the /etc/passwd file is information on the root account normally found?
It is the first entry in the /etc/passwd file
(36) What is the UID for the root account?
0
(36) What is the home directory for the root account?
/
(36) What is assumed if the last field of an entry in the /etc/passwd file is blank?
It is assumed that the default login shell is the bourne shell (sh)
(36) What is the file permissions for the others class with regard to the /etc/passwd file?
read
(37) T/F? There is a line in the /etc/shadow file for every line in the /etc/passwd file.
TRUE
(37) Define the fields associated with the following /etc/shadow file:<br/><table border=”1”><tr align=”center”><td>bob:</td><td>sL9yM04aEl3xA:</td><td>11000:</td><td>7:</td><td>100:</td><td>5:</td><td>20:</td><td>11500</td></tr><tr><td>1</td><td>2</td><td>3</td><td>4</td><td>5</td><td>6</td><td>7</td><td>8</td></tr></table>
1. bob = username<br/>2. sL9yM04aEl3xA = encrypted password<br/>3. 11000 = last change (the number of days since 01JAN1970) since the last password modification date<br/>4. 7 = minimum number of days between password changes<br/>5. 100 = max number of days a password is valid before the user is prompted to specify a new password<br/>6. 5 = the number of days a user has before they will have to change their password before being locked out<br/>7. 20 = the number of days a user account can be inactive before being locked out<br/>8. 11500 = the number of days from 01JAN1970 when the login may no longer be used
(37) T/F? All users have read access to the /etc/shadow file
False. Only root can read the contents of the /etc/shadow file
(38) What are the two UNIX commands that can be used to alter fields in the /etc/shadow file?
1. useradd<br/>2. passwd
(38) What will the following UNIX command produce: useradd –e
specifies an expiration date for login (YYYY-MM-DD format)
(38) What will the following UNIX command produce: useradd –f
specifies the max number of days of inactivity before the user account is invalid
(38) What will the following UNIX command produce: useradd –d
specifies the path of the user’s home directory
(38) What will the following UNIX command produce: useradd –m
creates the new home directory for a user if it doesn’t already exist
(38) What will the following UNIX command produce: useradd –c
allows the modification of the comment field for user account information
(38) What will the following UNIX command produce: passwd –f
forces the specified user to change their password at next login
(38) What will the following UNIX command produce: passwd –n
sets the minimum number of days between password changes for a user account
(38) What will the following UNIX command produce: passwd –x
sets the maximum number of days a password is valid for a user account
(42) What is the configuration file that defines where all messages and system logs get stored on a UNIX system?
/etc/syslog.conf
(42) What utility is used to schedule a job/process for a one time execution?
at
(42) What utility is used to schedule jobs periodically?
cron
(42) What UNIX command is used to create a cronjob?
crontab –e
(42) What UNIX command is used to display the crontab file?
contab –l
(42) What are the six fields of the crontab file?
1. Minute (00-59)<br/>2. Hour (0-23)<br/>3. Day of the Month (0-max in that month)<br/>4. Month (1-12)<br/>5. Day of the Week (0-6; Sun-Sat)<br/>6. Task or action
(46) What UNIX command is used to archive data on the system?
tar
(46) What will the following UNIX command produce: tar –cvf
an archive will be created, listing each file as the tar writes it
(46) What will the following UNIX command produce: tar –xvf
extracts the files located in an archive file to a targeted destination