
Linux Creating Users and Groups
Authored by Patrick Hines
Computers
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are the system administrator for a company's marketing department. A new marketing intern, Sarah Lee, needs access to the company file server but shouldn't be able to modify critical marketing documents. What's the best approach?
Answer explanation
Providing read-only group permissions ensures Sarah can access files while preventing unauthorized modifications.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're managing a web server and need to create separate user accounts for two developers, Alex and Ben. Alex will manage the web application's codebase, while Ben will be responsible for uploading static content. Which command would be most appropriate to create these accounts?
Answer explanation
The useradd -m -G developers Alex Ben command creates user accounts with home directories and assigns them both to the "developers" group.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company uses a Linux server to manage customer data. To ensure data security, you decide to create a dedicated user account for a data processing script. This user account shouldn't have a shell access. Which option achieves this during account creation?
Answer explanation
The -s /sbin/nologin flag with useradd prevents login access for the user account.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A colleague needs temporary access to manage a specific directory on your Linux system. How can you grant them access without creating a full user account?
Answer explanation
Creating a group and assigning directory ownership allows controlled access without a full user account.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're managing a team of network administrators. Each administrator needs access to manage network configurations but shouldn't be able to modify critical system files. What's the best course of action?
Answer explanation
Granting sudo access with specific command permissions allows administrators to manage networks without full root privileges.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You suspect a user account on your system might be compromised. What's the first step to investigate?
Answer explanation
Locking the account prevents further access while allowing investigation to determine the compromise.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While managing user accounts, you accidentally mistype the username during account creation. How can you fix this username error?
Answer explanation
The usermod command allows modifying various user account attributes, including the username.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?