Exam 11: Common Administrative Tasks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ facility used by the System Log Daemon specifies messages from the Linux kernel.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

kern

To lock an account, you can use the usermod command with the ____ option.

Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
Verified

D

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

D

In the process called ____________________, a user's user name and password are checked against a system database that contains all user account information.

(Short Answer)
4.9/5
(39)

Describe how the /etc/passwd and /etc/shadow directories are used in the authentication process. Why are two files used instead of one? How can you convert a system to use the /etc/shadow file to store passwords?

(Essay)
4.8/5
(38)

CUPS contains versions of the lpr , lpc , lpq , and lprm commands.

(True/False)
4.8/5
(37)

If you want to enable a printer, you must specify the full path to the enable command.

(True/False)
4.8/5
(33)

Any line that starts with a(n)____ character is a comment in the /etc/syslog.conf file.

(Multiple Choice)
4.9/5
(34)

The lp command uses the ____ option to specify the destination printer name.

(Multiple Choice)
4.9/5
(36)

You can create user accounts on the Linux system by using the ____ command.

(Multiple Choice)
4.8/5
(39)

The skeleton directory on most Linux systems is ____.

(Multiple Choice)
4.8/5
(32)

After adding or modifying printer settings, you must restart the CUPS daemon for the settings to take effect.

(True/False)
4.8/5
(35)

You can restrict who can print to certain printers by using the ____ command.

(Multiple Choice)
4.9/5
(31)

By default, all print jobs have a priority of ____.

(Multiple Choice)
4.8/5
(31)

To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

(Multiple Choice)
4.7/5
(26)

A set of information that is sent to a printer at the same time is called a(n)____________________.

(Short Answer)
4.7/5
(31)

The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.

(Multiple Choice)
4.9/5
(33)

You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.

(Multiple Choice)
4.8/5
(35)
Match each term with the correct statement below.
The unique User ID that is assigned to each user.
CUPS
For non-comment entries in the /etc/syslog.conf file, the area of the system to listen to.
syslogd
Daemon that handles the logging of most events.
GID
Correct Answer:
Verified
Premises:
Responses:
The unique User ID that is assigned to each user.
CUPS
For non-comment entries in the /etc/syslog.conf file, the area of the system to listen to.
syslogd
Daemon that handles the logging of most events.
GID
Utility used to back up and clear log files from entries stored in the /etc/logrotate.conf file and files stored in the /etc/logrotate.d directory.
LPD
The primary Group ID for a user.
logrotate
Accepting print jobs into a print queue.
spooling
The group that is made the group owner of any file or directory that the user creates.
UID
A printing system used by many older Linux computers.
primary group
The most common printing system used on Linux computers.
facility
(Matching)
4.9/5
(34)

On most Linux systems, the logrotate utility is automatically scheduled to run weekly.

(True/False)
4.9/5
(36)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)