DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Access Permissions
«Prev
Next»
Linux Admin
System Administration
Unix related OS
Determining Unix Version
SU root Privileges
Manual Admin
essential man Options
Adding New Man Pages
man Default Path
Unix OS Conclusion
Access Permissions
File Attributes Permissions
Manipulating Groups Owners
Basic Access Permissions
Numeric Access Codes
Setting Default Permissions
chmod Command
Additional Permission Bits
Unix File Ownership
File Types
Regular Files
Device Files
Symbolic Links
Determining File Types
Directory Listings
ls Command Options
Finding Files Command
Command Predicates
Using xargs with find
wc head tail Commands
Files Directories
Unix Process
Types Processes
Unix Fork Call
Process Access Permission
Suid Guid Permissions
Monitor Running Processes
Search Paths
Simple Shell Script
Periodic Process
crontab Command
Editing Control Crontab
Unix Process Conclusion
Devices Disk Filesystems
Mapping Files Physical Devices
File Ownership Access Permissions - Quiz
Select the best answer or answers for each question.
1.
For what is the ls command used?
Please select the best answer.
A.
To change the ownership of a file
B.
To change the group of a file
C.
To list information about the files in a directory
D.
To list information about a file’s contents
2.
What are the levels of access control on UNIX systems?
Please select all the correct answers.
A.
User
B.
Administrator
C.
Group
D.
Other
3.
What command is used to modify a file’s owner?
Please select the best answer.
A.
ls
B.
touch
C.
chmod
D.
chown
4.
What are the permission types a UNIX file can be assigned?
Please select all the correct answers.
A.
Read
B.
Execute
C.
Group
D.
Write
E.
User
5.
What are the numeric equivalents of the alphabetic permission bits?
Please select the best answer.
A.
r has value 5, w has value 3, and x has value 1.
B.
r has value 3, w has value 2, and x has value 1.
C.
r has value 4, w has value 2, and x has value 1.
D.
r has value 1, w has value 2, and x has value 3.
6.
What is the purpose of the umask command?
Please select the best answer.
A.
To establish numeric equivalents for alphabetic permissions
B.
To view and set the value that determines a new file’s default permissions
C.
To manipulate permission bits for a file or directory
D.
To hide a user’s password from unauthorized viewing
7.
How is the save text permission bit indicated?
Please select the best answer.
A.
s
B.
c
C.
p
D.
t
8.
For what is the chmod command used?
Please select the best answer.
A.
To find manual pages
B.
To obtain root privileges
C.
To manipulate permission bits
D.
To modify a file’s ownership
9.
Where is the most common place for a umask command?
Please select the best answer.
A.
In a system-wide login initialization file or user initialization file
B.
In the same location as the manual file for the command
C.
In a protected file in the root directory
D.
In a file with read-write-execute permission in a user’s home directory
10.
How are the SUID/SGID text permission bits indicated?
Please select the best answer.
A.
s
B.
t
C.
p
D.
c