• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back
contains all the configuration files
/etc
sh
bourne
bash
bourne again
ksh
korn
csh
c shell
clear the scrn
clear
where users folders reside
/export/home/
user and acct info
/etc/passwd
password encryption and password aging
/etc/shadow
internet daemon setup file
/etc/inetd.conf
optional packages and 3rd party software
/opt
contains processes used by the system
/proc
temporary files
/tmp
programs used to boot the system
/sbin
paths that begin with root /
absolute pathnames
paths that begin with the working directory
relative pathnames
main security weakness of unix
root user
anatomy of a unix command
command option/switch arguement
displays the manual
man
create a directory
mkdir
remove an empty directory
rmdir
display the contents of a file one line at a time
more
display the file on the screen
cat
display the last few lines of a file
tail
display the first few lines of a file
head
list the contents of a dir
ls
present working directory
pwd
change working directory
cd
move or rename a file
mv
copy a file
cp
searches for strings inside files
grep
change passwords
passwd
change permissions of a file or dir
chmod
change user
su
add a user via command line
useradd
display the status of all active processes
ps
stop a process
kill
respawn a killed process or to effect conf changes
-HUP
used to archive files
tar
compress a file
gzip
uncompress a file
gunzip
set characteristics of the net interface
ifconfig
view network status/acty
netstat
display info on system users
finger
send packets to another device
ping
shows path for executing commands
which
clear the screen
clear
display date
date
displays whos logged in
who
displays who you are logged in as
whoami
create a file with nothing in it
touch
reports the amount of free space
df
most often used method of initiating a system shutdown
shutdown
run level 0
terminates operating system where its safe to pwr down
single user/admin state
run level 1
run level 2
multi user state, all facilities except NFS are available
run level 3
multi user state including NFS
default state for solaris 9
run level 4
user defined state - never used
run level 5
used to bring sys safe to pwr down
run level 6
stop and reboot state
how to start a run level state
init
name 2 states of vi
command or input
3 vi deletion commands
x delete current char
D delete to end of line
dd delete current line
3 vi insertion commands
i insert before cursor
I insert at beginning of line
o insert below current line
display line numbers in vi
:set nu
save in vi
:w
quit without save in vi
:q!
save and quit vi
:wq
3 classes of permissions
owner
group
other
types of file indicators in a permission list
- ordinary file
d directory
b special block file
c special character file
l link
name the permission groups of a permission list
2-4 owner
5-7 group
8-10 other
what does x allow for a directory
allows a user to cd into the dir
what are the octal codes for rwx
r - 4
w - 2
x - 1
show the current run level
who -r
etc/passwd field 1
login name
etc/passwd field 2
x - placeholder for passwd
etc/passwd field 3
UID
etc/passwd field 4
GID
etc/passwd field 5
users meta info, like full name, phone number
etc/passwd field 6
path to the users home dir
etc/passwd field 7
user's default login shell
etc/shadow field 1
user name
etc/shadow field 2
encrypted passwd, LK stands for locked
etc/shadow filed 3
last password change date
etc/shadow field 4
min num of days between pswd changes
etc/shadow field 5
max num of days user has to change pswd before its locked
etc/shadow field 6
nu of days of not changing default pswd before acct lock
etc/shadow field 7
n. of days inactivity before acct lock
etc/shadow field 8
n. of days the login my no longer be used
who can read etc/shadow?
only root
command for gui for user accounts
admintool
2 types of backup
full and incremental
dump levels
0 - full
1-9 altered files
where are run level scripts contained?>
/etc/rc2.d
integrated solaris to enhance security
aset
default umask
022
aset level that makes recommendations but no changes
low
aset level that may make some changes
med
aset level that may stop services
high