Home > OS >  Linux operating system, to see how to do?
Linux operating system, to see how to do?

Time:12-13




Each item one, single topic selection (5 points)
1. Ordinary users can use the command sudo command which option to view authorized? ()
A. the -l
B. - a
C. the -m
D. -s
2. Was awarded SetUID permissions when a command is a regular user executes, really execute commands which user is a valid user? ()
A.r oot
B. The owner of the command
C. The average user
D.n obody user
3. Delete specified user ACL, which option should be used? ()
A. - b
B. the -m
C. -x
D. - D
4. Assuming the system default permissions umask value is 022, so, in establishing a common file, it is the default permissions? ()
A. 755
B. 644
C. 666
D. 777
5. File/dev/sdc7 for hardware equipment, the following: what is the most accurate description? ()
A. The hardware device files on behalf of the third piece of hard disk partition 7
B. This hardware device file represents the third piece of SATA interface
the third logic of hard disk partitionC. The hardware device files on behalf of the third piece of SATA interface of hard disk partition 7
D. The hardware device file for third third logical partition of disk
6. Using the mount command to mount a storage device, if you do not specify a mount option, will use the defaults mounted by default option, which option do not belong to the defaults mounted by default option? ()
A.a time
B.s ync
C.r w
D.n oexec
7. CD which of the following is the default file system? ()
Anderson so9660
B.e xt4
C.N TFS
D.x fs
8. In the interface between fdisk, which option is used to modify partition system ID? ()
A.n
B.m
C.p
Which
9. Which reserved the default directory is not system mounted directory? ()
A./media/
B./misc/
C./MNT/
D./dev/
10. The following content which field is not the contents of the/etc/fstab file? ()
A. The user name
B. Hardpoints
C. The file system
D. Mount the parameter

Second, the practice topic (each item 10 points, screenshots show) :
1. Add user Helen, setting vim command (/usr/bin/vim) has a SetUID permissions; Helen to switch to the users, with a vi to edit/etc/shadow, delete David user password, try to use David users from the local login to check the effect,

2. Add user David and Helen in Linux Settings only David users can perform the su command to switch to root (writing) to set of authorization files belong to,




3. Using ACL authorization Helen users have read, the system directory/var/write permissions, David users have read, write, execute permissions,


4. Using the root user login Linux, create the directory/test/, create a file in the/test/directory newfile, awarded/test/directory have RWX permissions to all users, create a regular user testuser with, switch to the "rm/test/newfile" testuser with implementation, can perform at this time? Switch back to the root, granted permission SBIT/test/directory, and then switch to the "rm/test/newfile" testuser with implementation, it can perform?


5. Build apache service request custom home page file content for your Chinese name, such as: wangke, (screenshot requirements: 1. The interception of the home page file storage path; 2 capture page file name; Three intercept the inside of the home page file contents)

CodePudding user response:

Bosses to see, is a bit harder
  • Related