End of Chapter Solutions Template



Guide to Linux+ (2nd Edition)

ISBN 0-619-21621-2

End of Chapter Solutions

Chapter 11 Solutions

Review Questions

1. The process of sending print jobs from the print queue to the printer is called?

a. spooling

b. queuing

c. redirecting

d. printing

Answer: d

2. You can clear a log file simply by redirecting nothing in to it. True or False?

Answer: True

3. When a printer is disabled, ________.

a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

b. the print queue does accept jobs into the print queue and holds them there until the printer is enabled again

c. the printer appears as off-line when a lp request is sent

d. the print queue redirects all print jobs sent to it to /dev/null

Answer: b

4. What is the name used to describe a user providing a user name and password to log in to a system?

a. validation

b. authorization

c. login

d. authentication

Answer: b

5. Which command can you use to lock a user account?

a. lock username

b. secure username

c. usermod –L username

d. useradd –L username

Answer: c

6. Which command can be used to alter the primary group associated with a given user temporarily?

a. usermod

b. chggrp

c. gpasswd

d. newgrp

Answer: d

7. Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

a. lp –d Printer1 file

b. lp Printer1 file

c. lp file

d. lp –m Printer1 file

Answer: a, c

8. What is the name of the file that contains a listing of all users on the system and their home directories?

a. /etc/passwd

b. /etc/users

c. /etc/shadow

d. /etc/password

Answer: a

9. UIDs and GIDs are unique to the system and once used can never be reused. True or False?

Answer: False

10. What is the name of the utility used to rotate log files?

a. syslog

b. jetpack

c. logrotate

d. logbackup

Answer: c

11. You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

Answer: True

12. When a printer is rejecting requests,____________.

a. the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

b. the print queue does accept jobs into the print queue and holds them there until the printer is accepting requests again

c. the printer appears as off-line when a lp request is sent

d. the print queue redirects all print jobs sent to it to /dev/null

Answer: a

13. When referring to the /etc/syslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

a. section, priority

b. service, precedents

c. process, degree

d. facility, priority

Answer: d

14. Most log files on the system are found in which directory?

a. /etc/logfiles

b. /etc/log

c. /var/log

d. /dev/log

Answer: c

15. Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

a. /etc/skel

b. /etc/passwd

c. /etc/login.defs

d. /etc/default/useradd

Answer: c

16. What is the background process responsible for printing on Red Hat Fedora Linux?

a. lp

b. cupsd

c. lpd

d. lpstat

Answer: b

17. Which command would you use to unlock a user account?

a. unlock username

b. open username

c. usermod –U username

d. useradd –U username

Answer: c

18. Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

Answer: False

19. You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

a. cancel Printer1-17 Printer1-21

b. cancel –u Printer1-17 Printer1-21

c. cancel –a Printer1-17 Printer1-21

d. cancel 17 21

Answer: a

20. Which command is used to delete a user account?

a. usermod –d username

b. del username

c. userdel username

d. rm username

Answer: c

Project 11-1

Step 1: Not available.

Step 2: Not available.

Step 3: Not available.

Step 4: Not available.

Step 5: Not available.

Step 6: Not available.

Step 7: Not available.

Step 8: Not available.

Step 9: Yes.

Step 10: Not available.

Step 11: Not available.

Step 12: Not available.

Step 13: Not available.

Project 11-2

Step 1: Not available.

Step 2: Yes, yes.

Step 3: Not available.

Step 4: Not available.

Step 5: p1-1.

Step 6: Not available.

Step 7: p1-2.

Step 8: Not available.

Step 9: Not available.

Step 10: Not available.

Step 11: No.

Step 12: Not available.

Step 13: Yes.

Step 14: Not available.

Step 15: Not available.

Project 11-3

Step 1: Not available.

Step 2: Socket; syslog daemon; centralizes logging.

Step 3: /var/log/cron.

Step 4: Not available.

Step 5: Not available.

Step 6: Not available.

Step 7: Information about cron daemon startup is displayed on the last line.

Step 8: 4:02 A.M..

Step 9: Weekly; 4.

Step 10: 20; yes.

Step 11: 31.

Step 12: Not available (answers will vary).

Step 13: Not available.

Project 11-4

Step 1: Not available.

Step 2: Top; bottom; 37.

Step 3: root; root; everyone (mode=644).

Step 4: Encrypted password; !!

Step 5: root; root; only the root user (password security – mode=400).

Step 6: File does not exist because all information is now stored in /etc/passwd.

Step 7: Encrypted password.

Step 8: Configures system to store password information in the /etc/shadow file.

Step 9: Not available.

Step 10: /bin/bash; /etc/skel; /home.

Step 11: Hidden environment files and directories; all files are copied to new user home directories to provide environment variables and files.

Step 12: Not available.

Step 13: makes the home directory; /etc/default/useradd.

Step 14: /bin/bash; /home/bozo; 501.

Step 15: No; no.

Step 16: Not available.

Step 17: All files in Step 11 are present plus the inittab file.

Step 18: Not available.

Project 11-5

Step 1: Not available.

Step 2: Not available.

Step 3: Not available.

Step 4: Only the login name changed.

Step 5: Not available.

Step 6: Yes.

Step 7: The 7th field.

Step 8: The 9th field; the number of days since January 1, 1970.

Step 9: The 4th field.

Step 10: The 5th field.

Step 11: The 4th field.

Step 12: Not available.

Project 11-6

Step 1: Not available.

Step 2: Not available.

Step 3: Not available.

Step 4: a ! was placed at the beginning.

Step 5: No.

Step 6: Not available.

Step 7: Not available.

Step 8: They are identical.

Step 9: Yes.

Step 10: Not available.

Step 11: Not available.

Step 12: /bin/false is not listed in /etc/shells; yes.

Step 13: No.

Step 14: Not available.

Step 15: Not available.

Step 16: Yes.

Step 17: Not available.

Step 18: Not available.

Step 19: Not available.

Project 11-7

Step 1: Not available.

Step 2: bozo; users typically manage their own files.

Step 3: No.

Step 4: 666.

Step 5: Makes a home directory and assigns a UID.

Step 6: Not available.

Step 7: /home/bozoette; 666.

Step 8: bozoette; yes.

Step 9: Not available.

Project 11-8

Step 1: Not available.

Step 2: Not available.

Step 3: Not available.

Step 4: bozoette, groupies.

Step 5: bozoettee directory and assigns a UID.

Step 6: Not available.

Step 7: bozoette, bozoette because bozoette is the owner and bozoette is the primary group.

Step 8: Not available.

Step 9: Not available.

Step 10: bozoette, groupies because bozoette is the owner and groupies is the primary group.

Step 11: Not available.

Step 12: Not available.

Step 13: /etc/group.

Step 14: Not available.

Discovery Exercises

Discovery Exercise 1

a) kern.=crit /var/log/alert

b) user.* /var/log/userlog

c) lpr.debug /var/log/printer

d) mail.*;mail.!=notice /var/log/mailman

e) *.=alert;*.=crit /var/log/serious

f) kern,lpr.=warn; kern,lpr.=error /var/log/shared

Discovery Exercise 2

The –D option modifies /etc/default/useradd to set default options for future account additions. The command used to set the expiry for all new accounts is useradd –D –e "2015-03-05".

Discovery Exercise 3

Add the entry:

*.warn /var/log/sample.log"

to the /etc/syslog.conf file.

Add the entries:

/var/log/sample.log {

compress

daily

rotate 6

}

to either the /etc/logrotate.conf file or a new file in the /etc/logrotate.d directory.

Discovery Exercise 4

Not available.

Discovery Exercise 5

Not available.

Discovery Exercise 6

a) useradd –u 733 –c "accounting manager" –p Gxj234 bsmith

b) userdel jdoe

c) usermod –c "shipping" – e "2011-03-23"

d) passwd –l wjenkins (answers will vary!)

e) passwd bsmith (specify the correct password)

f) usermod –l wjones –G managers tbanks

g) useradd –u 0 –g root –o –r wjones

h) useradd –p he789R jdoe

i) usermod –g root wsmith

j) usermod –G acctg joe ; usermod –G acctg tbanks

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download