Search Header Logo

Linux Setting Ownership and Permissions

Authored by Patrick Hines

Computers

Professional Development

Used 11+ times

Linux Setting Ownership and Permissions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are the system administrator for a company's marketing department. A shared document folder needs to be accessible for read/write access by all marketing team members but should be modifiable only by the marketing manager. What's the most appropriate approach?

Set the folder permissions to grant read/write access for everyone.
Assign ownership of the folder to the marketing manager and set group permissions to read/write.
Set the folder permissions to read-only for everyone.
Create a group for the marketing team and grant them read/write access, while setting the folder owner to the marketing manager.

Answer explanation

While option (Assign ownership of the folder to the marketing manager and set group permissions to read/write.) allows modification by the manager and read access for the team, option (Set the folder permissions to read-only for everyone.) provides granular control. The marketing team can access and modify documents within the group permissions, while the manager retains ownership for additional control if needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're managing a web server and need to restrict access to a critical configuration file. The web server process itself needs read access to this file. What permission settings would achieve this?

rw-r-----
rw-rw----
r-x------
rw-------

Answer explanation

(r-x------) grants read-only access (r) to the owner (web server process) and no permissions for others. This ensures the configuration file remains secure while allowing the web server to function.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You accidentally delete a file on your Linux system. Is there a way to recover it?

No
It depends
Yes
There's no way to recover deleted files in Linux.

Answer explanation

There's no way to recover deleted files in Linux. Depending on your filesystem configuration, tools like photorec or utilities offered by your specific distro might help recover recently deleted files.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A colleague needs temporary write access to a specific directory on your Linux system. How can you grant them access without modifying group memberships?

Modify file permissions for the directory to grant write access for everyone.
There's no way to grant temporary access without modifying group memberships.
Create a new group specifically for this purpose and add your colleague.
Change the ownership of the directory to your colleague's user account.

Answer explanation

Modifying file permissions for the directory allows controlled access without permanent group changes. You can revert the permissions later.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You suspect a critical system file might have been tampered with. What's the first step to investigate?

Modify the file permissions to prevent further changes.
Immediately delete the file.
Compare the file's modification time with previous backups.
Use the chgrp command to change the file's group ownership.

Answer explanation

Comparing modification times with backups helps identify discrepancies that might indicate tampering.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While working on a development project, you and your teammate need shared read/write access to all project files. What's the recommended approach for permission management?

Set all project directory permissions to allow full access for everyone.
Create a group for your development team and assign ownership of all project files to that group.
There's no need to modify permissions as user accounts inherently have access to their own files.
Modify individual file permissions for each project file.

Answer explanation

Creating a group and assigning ownership ensures controlled access within the development team while maintaining security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You identify an unused directory on a server that contains sensitive log files. How can you secure these files?

There's no need to modify permissions as unused directories are inherently secure.
Delete the directory to eliminate any security risks.
Set the directory permissions to deny all access for everyone.
Change ownership of the directory to a system account with limited privileges.

Answer explanation

Denying all access with permissions ensures the log files remain secure even if someone discovers the directory.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?