5.1 Basic Security and Identifying User Types Flashcards

1
Q

Security

all system-local user account POSIX other than pw readable by all

A

/etc/pswd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security

all system-local group account POSIC readable by all

A

/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security

all system-local user pw hashes and expiration info - unreadable by any - only select processes.

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security

all system-local priv escalation info/allowance by sudo command

A

/etc/sudoers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security

list real or effective user and group IDs

A

id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security

list users who logged in last

A

last

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security

list users who are currently logged in

A

who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security

similar to who but with additional context

A

w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security

switch to another user with a login shell or run commands as that user by passing that user’s pw

A

su

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security

switch User or Superuser Do - if entitled, the current user enters their own pw if required to raise priv

A

sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security

change user’s shell

A

chsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security

change user’s info on the GECOS field

A

chfn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security

The UID and GID attributes are stored

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security

The Groups attribute is stored

A

/etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security

where is the has user password stored

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security

cryptography used by default to store p/w locally on inux

A

one-way hash

17
Q

Security

If an account has a User ID (UID) enumerated under 1000, what type of account is this?

A

system account

18
Q

Security

How can you get a list of the active logins in your system, and a count of them as well?

A

Use the w command. Besides a list of all active logins, it will also show information like how
many users are logged in, along the system load and uptime.

19
Q

Security

commands to list current users logged into the system

A

w

who

20
Q

Security

command to list users that have disconnected.

A

last

21
Q

Security

What is the difference between the w and the who command

A

w command lists system utilization while who does not.

22
Q

Security

w command no header option

A

-h

23
Q

Security

w command short option

A

-s

24
Q

Security

w command ip address option

A

-i

25
Q

Security

file that stores a user’s one-way password hash

A

/etc/shadow

26
Q

Security

file that contains a list of groups a user account is a member of

A

/etc/group

27
Q

Security

What logic can be used to compile a list of groups a user account is a member of?

A

/etc/group

28
Q

Security

how to change current user’s login shell to Korn Shell (/usr/bin/ksh) in non-interactive mode?

A

chsh -s /usr/bin/ksh

29
Q

Security

why is the home directory of the root user not placed within the /home directory

A

because root account is required to troubleshoot and fix errors and may include file system issues related to /home directory and in such cases root should be fully functional even when /home file system is not available yet.