Search Header Logo

Chapter 10 - UNIX II

Authored by Kelly Gafford

Computers

University

Used 8+ times

Chapter 10 - UNIX II
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A __ is the area of the system to listen to.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

The ​ (a)   refers to the ​ (b)   of the information collected.

priority
importance
facility
area

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which entry is correct to log all kernel messages except warnings

kern.*;kern.noWarn

kern.*;kern.!=warn

kern.info;!=warn

*.=warn;kern.none

4.

REORDER QUESTION

1 min • 1 pt

Reorder the following facilities into their proper level of severity.

debug

info

err

Panic

warn

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ___ configuration file is responsible for renaming log files on a cyclic basis.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file(s) contains a list of users and their encrypted password?

/etc/shadow

/usr/shadow

/etc/passwd

/etc/password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file contains the GECOS information for users?

/etc/shadow

/etc/group

/etc/passwd

/etc/password

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers