Linux Setting Ownership and Permissions

Linux Setting Ownership and Permissions

Professional Development

36 Qs

quiz-placeholder

Similar activities

Chapter 10 Understanding Cryptography and PKI

Chapter 10 Understanding Cryptography and PKI

Professional Development

36 Qs

20742B Identity with Windows Server 2016

20742B Identity with Windows Server 2016

Professional Development

41 Qs

MS office 2016

MS office 2016

1st Grade - Professional Development

40 Qs

Lvl 1 Introduction DBMS (QB)

Lvl 1 Introduction DBMS (QB)

Professional Development

39 Qs

CyberPatriots!

CyberPatriots!

3rd Grade - Professional Development

38 Qs

Win 10 Practice Test v1

Win 10 Practice Test v1

9th Grade - Professional Development

39 Qs

A+ 1102 Day2 Windows 10 Command Line Tools

A+ 1102 Day2 Windows 10 Command Line Tools

Professional Development

32 Qs

Docker Networking and Storage

Docker Networking and Storage

Professional Development

37 Qs

Linux Setting Ownership and Permissions

Linux Setting Ownership and Permissions

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Patrick Hines

Used 7+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are the system administrator for a company's marketing department. A shared document folder needs to be accessible for read/write access by all marketing team members but should be modifiable only by the marketing manager. What's the most appropriate approach?
Set the folder permissions to grant read/write access for everyone.
Assign ownership of the folder to the marketing manager and set group permissions to read/write.
Set the folder permissions to read-only for everyone.
Create a group for the marketing team and grant them read/write access, while setting the folder owner to the marketing manager.

Answer explanation

While option (Assign ownership of the folder to the marketing manager and set group permissions to read/write.) allows modification by the manager and read access for the team, option (Set the folder permissions to read-only for everyone.) provides granular control. The marketing team can access and modify documents within the group permissions, while the manager retains ownership for additional control if needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're managing a web server and need to restrict access to a critical configuration file. The web server process itself needs read access to this file. What permission settings would achieve this?
rw-r-----
rw-rw----
r-x------
rw-------

Answer explanation

(r-x------) grants read-only access (r) to the owner (web server process) and no permissions for others. This ensures the configuration file remains secure while allowing the web server to function.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You accidentally delete a file on your Linux system. Is there a way to recover it?
No
It depends
Yes
There's no way to recover deleted files in Linux.

Answer explanation

There's no way to recover deleted files in Linux. Depending on your filesystem configuration, tools like photorec or utilities offered by your specific distro might help recover recently deleted files.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A colleague needs temporary write access to a specific directory on your Linux system. How can you grant them access without modifying group memberships?
Modify file permissions for the directory to grant write access for everyone.
There's no way to grant temporary access without modifying group memberships.
Create a new group specifically for this purpose and add your colleague.
Change the ownership of the directory to your colleague's user account.

Answer explanation

Modifying file permissions for the directory allows controlled access without permanent group changes. You can revert the permissions later.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You suspect a critical system file might have been tampered with. What's the first step to investigate?
Modify the file permissions to prevent further changes.
Immediately delete the file.
Compare the file's modification time with previous backups.
Use the chgrp command to change the file's group ownership.

Answer explanation

Comparing modification times with backups helps identify discrepancies that might indicate tampering.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While working on a development project, you and your teammate need shared read/write access to all project files. What's the recommended approach for permission management?
Set all project directory permissions to allow full access for everyone.
Create a group for your development team and assign ownership of all project files to that group.
There's no need to modify permissions as user accounts inherently have access to their own files.
Modify individual file permissions for each project file.

Answer explanation

Creating a group and assigning ownership ensures controlled access within the development team while maintaining security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You identify an unused directory on a server that contains sensitive log files. How can you secure these files?
There's no need to modify permissions as unused directories are inherently secure.
Delete the directory to eliminate any security risks.
Set the directory permissions to deny all access for everyone.
Change ownership of the directory to a system account with limited privileges.

Answer explanation

Denying all access with permissions ensures the log files remain secure even if someone discovers the directory.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?