Make user1, user2 and user3 belongs to training group.
Answer and Explanation:
There are two types of group, I) primary group II) Secondary or supplementary group.
Here user1, user2 and user3 belong as supplementary to training group. So these users get the permission of group member.
Change the Group Owner of /data to training group.
Answer and Explanation:
chown or chgrp command is used to change the ownership.
Syntax of chown: chown [-R] username:groupname file/directory
Syntax of chgrp: chgrp [-R] groupname file/directory
Whenever user creates the file or directory, the owner of that file/directory automatically will be that user and that user’s primary group name.
To change group owner ship
or
chown root.training /data Which set the user owner to root and group owner to training group.
Verify /data using: ls -ld /data
You will get: drwxr-xr-x 2 root training …………..
Give Full Permission to owner user and owner group member but no permission to others on /data.
Answer and Explanation:
We can change the permission of file/directory either character symbol method or numeric method.
Permission:
r-Read
w-Write
x-Execute
Permission Category
u- Owner User
g- Owner Group
o- Others
Operators
+ Add the Permissions
- Remove the Permissions
= Assigns the Permissions
Numeric Method:
4Read
2 Write
1Execute
Total: 7, total for owner user, owner group member and for others : 777
or
chmod 770 /data
Deny to all users except root to run cron schedule.
Answer and Explanation:
1.vi /etc/cron.allow
root
or
vi /etc/cron.deny
Write all user name to deny.
/etc/cron.allow, /etc/cron.deny file is used to control users to allow or deny. If /etc/cron.allow file is created only that users are allowed to run cron schedule. Another way to deny to users is /etc/cron.deny write all user name on single line.
Your System is going to use as a Router for two networks. One Network is 192.168.0.0/24 and Another Network is 192.168.1.0/24. Both network’s IP address has assigned. How will you forward the packets from one network to another network?
Answer and Explanation:
1.echo “1” >/proc/sys/net/ipv4/ip_forward
2.vi /etc/sysctl.conf
net.ipv4.ip_forward = 1
If you want to use the Linux System as a Router to make communication between different networks, you need enable the IP forwarding. To enable on running session just set value 1 to /proc/sys/net/ipv4/ip_forward. As well as automatically turn on the IP forwarding features on next boot set on /etc/sysctl.conf file.
There are Mail servers, Web Servers, DNS Servers and Log Server. Log Server is already configured. You should configure the mail server, web server and dns server to send the logs to log server.
Answer and Explanation:
According to question, log server is already configured. We have to configure the mail, web and dns server for log redirection.
In mail, web and dns server:
1.vi /etc/syslog.conf
mail.*@logserveraddress
2.service syslog restart
mail is the facility and * means the priority. It sends logs of mail services into log server.
You are working as a System Administrator at Certpaper. Your Linux Server crashed and you lost every data. But you had taken the full backup of user’s home directory and other System Files on /dev/st0, how will you restore from that device?
Answer and Explanation:
1. Go to on that directory where you want to restore.
2. restore –rf /dev/st0
To restore from backup we use the restore command. Here backup will restore from /dev/st0 on current Directory.
Make on /archive directory that only the user owner and group owner member can fully access.
Answer and Explanation:
1.chmod 770 /archive
2.Verify using : ls –ld /archive
Preview should be like:
drwxrwx--- 2 root sysuser 4096 Mar 16 18:08 /archive
To change the permission on directory we use the chmod command. According to the question that only the owner user (root) and group member (sysuser) can fully access the directory so: chmod 770 /archive
Create the user named jackie, curtin, david
Answer and Explanation:
1.useradd jackie
2.useradd curtin
3. useradd david
useradd command is used to create the user. All user’s information stores in /etc/passwd and user;s shadow password stores in /etc/shadow.
Make Secondary belongs the both users on sysadmin group.
Answer and Explanation:
1.usermod -G sysadmin john
2.usermod –G sysadmin jane
3.Verify by reading /etc/group file
Using usermod command we can make user belongs to different group. There are two types of group one primary and another is secondary. Primary group can be only one but user can belongs to more than one group as secondary.
usermod -g groupname username To change the primary group of the user
usermod -G groupname username To make user belongs to secondary group.
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
RedHat Free Exams |
---|
|