DistributedNetworks DistributedNetworks


Access Permissions   «Prev  Next»

File Ownership Access Permissions - Quiz

Select the best answer or answers for each question.
 
1. For what is the ls command used?
Please select the best answer.
  A. To change the ownership of a file
  B. To change the group of a file
  C. To list information about the files in a directory
  D. To list information about a file’s contents

2. What are the levels of access control on UNIX systems?
Please select all the correct answers.
  A. User
  B. Administrator
  C. Group
  D. Other

3. What command is used to modify a file’s owner?
Please select the best answer.
  A. ls
  B. touch
  C. chmod
  D. chown

4. What are the permission types a UNIX file can be assigned?
Please select all the correct answers.
  A. Read
  B. Execute
  C. Group
  D. Write
  E. User

5. What are the numeric equivalents of the alphabetic permission bits?
Please select the best answer.
  A. r has value 5, w has value 3, and x has value 1.
  B. r has value 3, w has value 2, and x has value 1.
  C. r has value 4, w has value 2, and x has value 1.
  D. r has value 1, w has value 2, and x has value 3.

6. What is the purpose of the umask command?
Please select the best answer.
  A. To establish numeric equivalents for alphabetic permissions
  B. To view and set the value that determines a new file’s default permissions
  C. To manipulate permission bits for a file or directory
  D. To hide a user’s password from unauthorized viewing

7. How is the save text permission bit indicated?
Please select the best answer.
  A. s
  B. c
  C. p
  D. t

8. For what is the chmod command used?
Please select the best answer.
  A. To find manual pages
  B. To obtain root privileges
  C. To manipulate permission bits
  D. To modify a file’s ownership

9. Where is the most common place for a umask command?
Please select the best answer.
  A. In a system-wide login initialization file or user initialization file
  B. In the same location as the manual file for the command
  C. In a protected file in the root directory
  D. In a file with read-write-execute permission in a user’s home directory

10. How are the SUID/SGID text permission bits indicated?
Please select the best answer.
  A. s
  B. t
  C. p
  D. c