Flashcards in IS3440 CHAP 5 FILESYSTEMS, VOLUMES, AND ENCRYPTION Deck (55):
___ command is the group quota management file.
___ command is the user quota management file.
___ command assigns a new group owner to a file.
___ command modifies permissions to a file.
___ command assigns a new user owner to a file
___ command is associated with the enterprise cryptographic filesystem.
___ command to check and edit user quotas.
___ command is the Linux second extended filesystem.
___ command is the Linux third extended filesystem; includes journaling.
___ command is the Linux fourth extended filesystem; includes journaling and support for larger files.
___ command is one Linux partition configuration tool.
___ command to review ACL settings for a file.
(COMMAND) getfac 1
___ command that can encrypt and add digital signatures to a file.
___ command is the mount command option that sets user quotas; often found in
/ etc / fstab
___ Linux command to format and build a Linux filesystem. It is also a root for filesystem-specific commands such as (COMMAND) mkfs . ext3 and mkfs . risers, which set up a filesystem to the given format.
___ command is the default account for unauthorized users who connect to the NFS file-sharing server.
___ command is the default account for users on certain configured file-sharing servers.
___ command creates, checks, and repairs quota management files such as (COMMAND) aquota . user and aquota . group.
___ command is the Linux filesystem based on balanced trees, suited for groups of large and small files.
By itself, ___ command is the name of the standard Linux administrative user. The top-level root directory is symbolized by the forward slash (/). In contrast, the home directory of the root user is /root, which is a subdirectory of the top-level root directory (/).
___ command to create or modify ACL settings for a file.
(COMMAND) setfac 1
___ command is the main configuration file for the Samba/CIFS file server.
___ command is the mount command option that sets user quotas; often found in / etc/fstab.
___ command is the main configuration file for the very secure FTP daemon service.
___ command is the Linux filestytem developed by Silicon Graphics suited to larger files.
___ is an encryption standard configured by the National Institute of Standards and Technology (NIST).
(AES) Advanced Encryption Standard
___ is the system used to encrypt partitions and disks. Part of the device mapper and associated with the loadable (COMMAND) dm_crypt module.
Disk encryption subsystem
___ is anagram for Digital Signature Algorithm, originally used by the US government for digital signatures.
___ is a system adapted by Ubuntu to encrypt directories: uses the ecryptfs command.
(eCryptfs) enterprise cryptographic filesystem
___ is a probabilistic encryption scheme developed by There Elgamal (ElGamal).
___ is a protocol for organizing and storing files. Most require a format; typical formats include ext2, ext3, ext4, reiserfs and xfs commands.
___ is the way files and directories are organized in Linux. It includes a list of standard directories and the types of files normally stored in those directories.
(FHS) Filesystem hierarchy standard
___ isa data structure associated with a file.
___ refers to a filesystem that keeps track of changes to be written. Recovery tools can then use the journal to quickly find data on files to be written.
___ refers to tools that depend on drivers and modules loaded with the Linux kernel.
___ is a disk encryption specification that requires the (COMMAND) de_crypt module.
(LUKS) Linux unified key setup
___ is a public-key encryption algorithm, named for its developers, Rivest, Shamir, and Adleman.
___ is a set of cryptographic hash functions developed by the US National Security Agency.
(SHA) Secure hash algorithm
___ is a version of redundant array of independent disks that uses partitions instead of disks as components of the array.
___ refers to tools that do not depend on the Linux kernel.
1. Which of the following directories are suitable for separate filesystems? (Select two) The answer is stated in (COMMAND) FORM
2. Which of the following directories typically includes files associated with third-party applications? The answer is stated in (COMMAND) FORM
3. Which of the following directories is most well suited as a read-only filesystem? The answer is stated in (COMMAND) FORM
4. Which of the following filesystem formats is best suited for a smaller filesystem?
5. The command that lists currently loaded GPG keys is ___.
6. Which of the following directories contain GPG private and public keys?
7. Which of the following commands is associated with the Linux unifies key setup disk encryption specification?
8. Which of the folioing commands prohibits access from all users except the user owner and members of the group that owns the file named (COMMAND) filename?
1. chmod 770 filename
2. chmod 707 filename
3. chmod 077 filename
4. chmod 007 filename
chmod 770 filename
9. Which of the following commands sets the SUID bit on the file named filename?
1. chmod 1770 filename
2. chmod 2750 filename
3. chmod 770 filename
4. chmod 3777 filename
chmod 770 filename
10. IF you try to change files remotely on a shared NFS directory as the root administrative user, what happens?
1. The change fails, because the root user on one system is the nobody user on another system.
2. The change is successful
3. The change is successful even if the NFS directory is shared in read-only mode.
4. The change fails unless you log in with the root administrative password from the remote system.
The change fails, because the root user on one system is the nobody user on another system.
11. Which of the following Samba directives specify permissions of files created a shared network directory.
12. Which of the following directories is appropriate for quotas?
13. Which of the following commands lists quota usage by user?
14. what configuration file is used to configure ACLs for a filesystem?