QUESTION 48 Which of the following umask settings will result in new files receiving the default permissions -rw---? O a. 0177 O b.0600 O c. 0688 O d.0188
Q: Which of the following is true of group accounts? (Choose all that apply.) a. They organize users…
A: Basically Group Accounts are those accounts which are accessed by a group of individuals. In this…
Q: which of the following commands is used to run a following command as a privileged user ? a) runas…
A: To run a command as a privileged user means that a command that cannot be used by a normal user can…
Q: Following the execution of the command umask 731, the permissions of all newly created files and…
A: Introduction; Permissions: In Linux operating system, the permissions are written in the format…
Q: Which of the following commands will change the user ownership and group ownershipof file1 to user1…
A: "chown" command: In Linux operating system, "chown" command is used to change the group ownership…
Q: Which command is used to delete files and directories?
A: Command to delete file: rm filename If the file is in another directory, first change the directory…
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: at command in linux is used to schedule a job to execute on perticular time.at command to run a…
Q: Which option to the dpkg command can be used to list the files that comprise apackage?a. –lb. –Lc.…
A: “dpkg” command: The “dpkg” is a tool which is a package manager for Debian/Debian-based systems.…
Q: What does the IOS command "end" do? O a. it goes directly to privilege mode O b. it quits the CLI O…
A: a. it goes directly to privilege mode
Q: ich one of the following tool deletes your files/data permanently. a. Change Directory b. SDelete c.…
A: Given: Which one of the following tool deletes your files/data permanently.
Q: A user runs the fsck command with the -a option on a filesystem that is showing signsof corruption.…
A: "fsck" command: File system check order is the sixth field of the line that allows "fsck" to check…
Q: SECTION B below. Write Linux commands to complete the actions below bin tmp usr var etc home opt bin…
A: Our bounded restrictions are to answer the first three subparts only. - The question is to…
Q: BELOW MCQ GIVEN ANSWER CAN BE MORE THAN ONE OPTION. PLEASE PROVIDE CORRECT ANSWERS.…
A: ANSWER C
Q: IV. Write a command to add user account with these properties a. Name fedora b. ID-???, it's the…
A: The above question is solved in step 2:-
Q: After typing the command umask 731, the permissions on all subsequently created filesand directories…
A: Permissions: In Linux operating system, the permissions are written in the format where, The…
Q: Which of the following commands creates an archive?a. tar –cvf /dev/st0b. tar –xvf /dev/st0c. tar…
A: In Linux OS , tar command is used to make file archive and extract the archived file. It is an…
Q: Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is…
A: This mcq is based on NTFS permissions.
Q: Along with a listing of user accounts, the /etc/passwd file contains information onaccount expiry.…
A: In Linux, information about all the users in the system is stored in the configuration file…
Q: Question 8 options: In Linux, which command to use to check how to use ls command? (case sensitive)…
A: I have provided a solution in stp2
Q: Which of the following commands locates the current directory in the directory hierarchy? wcd pwd…
A: Step 1 The correct answer is given in the below step with an explanation.
Q: Which dump level indicates a full backup?a. 0b. 9c. 1d. f
A: Dump level indicates The dump is used to backup files or restore the files. The Dump level backup…
Q: The utility shutdown belongs to which directory of the file system? /dev /proc /bin /sbin
A: The shutdown command allows you to halt, power-off, and reboot your Linux system.
Q: Which of the following is the Linux command to rename files? a. rename b. F11 C. mv d. Is
A: the answer ia an rename
Q: Use the man or info pages to find a description of the –D option to the useradd command.What does…
A: The “useradd” creates a new user or update default new user information. The “useradd” with “-D”…
Q: Which of the following CLI command can also be used to rename files? a) rm b) mv c) rm -r d) none of…
A: Question. Which of the following CLI command can also be used to rename files? a) rm b) mv c) rm -r…
Q: Which command is used to display the amount of free space that exists on a filesystem?a. fsckb.…
A: Command for displaying the amount of free space The "df" command is used for knowing the amount of…
Q: After typing the command umask 731, what will the permissions on all new created files be
A: Umask, or the user file-creation mode is a Linux command that is used to assign the default file…
Q: 1]which command is used to compress a file? a. grip b. lpr c.compress d.none of the above
A: About command is used to compress a file
Q: n Linux Create a simple backup script to create a backup of the directory “Script2”. This script…
A: Shell script #!/bin/bash source=/home/script2dest=/home/backup echo "start copying files..." for…
Q: f. Write the command to show the contents of the file courses.txt. g. Write the command to change…
A: - We need to show the content of file named course.txt and change the working directory to work1.
Q: In JSLinux ,which of the following UNIX command can be used in absolute mode that grant the…
A: The correct answer is chmod 611 Read.txt i.e., option c. Chmod 611 (chmod a+rwx,u-x,g-rw,o-rw)…
Q: Which command entered without arguments is used to display a list of processes runningin the current…
A: Linux is a multitasking framework and a multi-user system, as we all know. So, by interacting with…
Q: You have just created a new account on your server and you would like to make sure that all the…
A: The umask goes about as a bunch of consents that applications can't set on documents. It's a…
Q: Why do I have two files with the same name in my account? Assume your home directory is active.…
A: Yes, on the UNIX/LINUX Operating System, it is possible to have two files with the same filename…
Q: Which of the following commands checks a file system for errors? a. cd b. ping C. cls d. chkdsk
A: Hello Student. Warm welcome from my side. Hope you are doing great. Here's your answer.
Q: Which of the following is the default permission set for the /root directory? O a. drwxrwxrwx O b.…
A: The default permission for the root directory is as follows:
Q: What is the name of the file that contains a listing of all users on the system and theirhome…
A: Name of file listing all users on the system /etc/passwd file is used for keeping track of every…
Q: Which file contains full and incremental back-up information for use with the dump/restore…
A: File containing full and incremental back up information The /etc/dumpdates contains tracking of…
Q: Which of the following UNIX command can be used in symbolic mode to grant the following permissions…
A: r = read w =write x =executer - sign indicates that particular permission has been removed b…
Q: We have a series of folders in the current folder which are named with permission codes (example:…
A: Directory structure.
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Command will change working directory from /usr/users/joe to /usr is cd directory. As cd command is…
Q: Which one of the following commands can be used to secure the privilege exec mode by using the…
A: Which of the following commands can be used to secure the privilege exec mode by using the plaintext…
Q: Which of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1,…
A: “chkconfig” command can be used to start a particular daemon in the required run levels. “chkconfig…
Q: Which of the following command can be used to remove the test DPM package, includingany test…
A: Explanation: There is only a small difference between “remove” and “purge” command. The “remove”…
Q: Which of the following Linux commands can you use to make the following script executable? Assume…
A: The chmod Command in Linux stands for Change Mode in LINUX, which is a function to change / modify /…
Q: Which of the following commands can be used to list the files contained within aninstalled RPM…
A: RPM command: RPM stands for Red Hat Package Manager is an default open source and most popular…
Q: Which of the following is a good practice ? A. Give full permission for remote transferring B.…
A: Given: Which of the following is a good practice ? A. Give full permission for remote transferringB.…
Q: What does the du /var command do?a. shows the users connected to the /var directoryb. shows the size…
A: In Linux/Unix operating system, to get the disk usage information du command is used. It is also…
Q: Which of the following command allows you to change directory to one level above your parent…
A: Question. Which of the following command allows you to change directory to one level above your…
48 number solution needed
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Given the following output from the is command, how many files are linked with file1? one two three fourAfter typing the ls –F command, you see the following line in the output:-rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1What does this mean?a. User1 has read and write, members of the root group have read and execute, and allothers have read permissions to the file.b. Members of the root group have read and write, user1 has read and execute, and allothers have read permissions to the file.c. All users have read and write, members of the root group have read and execute,and user1 has read permissions to the file.d. User1 has read and write, all others have read and execute, and members of theroot group have read permissions to the file.An "ls -l" command has described a file as "drwxrwx--x". While of the following statements about that file are true? Select all that apply. A. Anyone can list the contents of this file with an "ls" command. B. The owner can list the contents of this file with an "ls" command. C. Anyone can access files within this directory if they already know the file name. D. The group can add new files to the directory.
- When adding several user accounts, you might want to use the newusers utility, whichcan process a text file full of entries to add user accounts. Use the man or info page tofind out how to use this utility, and use it to add three users. When finished, view the/etc/passwd, /etc/shadow, and /etc/group files to verify that the users were addedsuccessfully.What chmod command would you use to impose the following permissions?a. on a directory such that: the owner would have read, write, and execute; the groupwould have read and execute; and others would have readb. on a file such that: the owner would have read and write; the group would have nopermissions; and others would have writec. on a file such that: the owner would have write; the group would have read, write,and execute; and others would have read and writed. on a file such that: the owner would have read and execute; the group would haveread, write, and execute; and others would have executee. on a directory such that: the owner would have execute; the group would haveread, write, and execute; and others would have no permissionsf. on a directory such that: the owner would have write; the group would have read,write, and execute; and others would have read, write, and executeg. on a directory such that: the owner would have read, write, and execute; the groupwould have read; and…Following the execution of the command umask 731, the permissions of all newly created files and folders will be altered.What will the permissions be on all new files in this case? a. rw-rw-rw b.rwxrw-r--c. -- -r--rw d.-- --wx--x
- Write the command that will create a tar archive of all the files in the directory named"/fir/sec/thi", that exists on the local machine. The name of the tar archive is "/tmp/animal".The command should be executed from the directory /home/user1. Write the command that will extract the tar archive that was created in Question #63. The contentsof the archive should be placed in the directory "/two/four/six". The command should be executedwhile the current directory is /tmp.The aim of this lab is to familiarize yourself with reading and processing directories aswell as extracting file attributes using the stat() system call. You are essentially writingyour own version of the long format of the ls command. You will need to customize youroutput to match the following specifications: -o: specifies the minimum age of the files (modification timestamp) to be listed fromthe target directory. The -o argument will be followed by an integer (as a separate parameter to make things easier if you wish). This integer will represent the minimumnumber of days old the files can be in order for them to be included in your listing.As an example "-o 3" passed as arguments would mean: list all files that have beenmodified more than 3 days ago (from the current system time).You need to send a backup copy of the /etc directory across the network. To create the file, use the tar command with the -cf switches to create a new archive file. Use -z as the preceding option to compress the file. In this lab, your task is to: Create a compressed archive of the /sales directory and all its contents Name the file /salesbkp.tar.gz and save it in the root directory (/).
- Below is a list of different access right settings. We want to implement shared update of certain files between Bob and Alice, but with no one else. Which of the following settings achieve this? Select all that apply. A. Assign Bob ownership to Alice's files, and Alice ownership to Bob's files. B. Put Bob and Alice is a user group, and give the group RWX access to the shared files. C. Use Windows basic file sharing and make Bob and Alice co-owners of the files. D. Set world access of the shared files to RWX.Hint: List of commands to read and use: cd, pwd, ls, echo, cat, od, quoting character and output redirection operator. Change your working directory to your login directory. A new file can be created in 4 different ways: (i) vi, (ii) touch, (iii) cp, and (iv) cat command. You have used touch and cp commands before. In this question, you will use cat command. In part II, you will use the vi text editor. Create a short file using cat command and output redirection operator > like cat > filename. The content of the file must be typed from the keyboard, which is the default standard input (stdin) device. End the input to the file by typing Ctrl d keys at the same time. Copy the file you have created to a new file. Display the content of the file you have created using one od command with appropriate option(s) for each question below: Display in character form Display in hexadecimal form Display in octal form Display in both character and octal form Using echo command, answer…Review the firewall ruleset shown below. If a system at 10.18.100.3 attempts an SSH (Secure shell) connection to the server at 192.168.10.5, what would be the result? (Analyze the rules carefully) Rule Source IP 1 2 3 4 any any 10.18.100.3 any Source Port any any any any Dest IP 192.168.10.5 192.168.10.6 192.168.10.6 any The traffic will be blocked by rule 4 The traffic will be blocked by rule 3 O The traffic will be allowed by rule 2 The traffic will be allowed by rule 1 Dest Port 1443 1521 22 any Action allow allow deny deny