Server 1 Day 8 Review

Server 1 Day 8 Review

12th Grade

30 Qs

quiz-placeholder

Similar activities

Danger online

Danger online

7th Grade - University

25 Qs

Grade 12 D and E - Quiz 1 - Ms. Dina Mohamed

Grade 12 D and E - Quiz 1 - Ms. Dina Mohamed

12th Grade

27 Qs

TEST BANK: HARDWARE AND DIGITAL SECURITY

TEST BANK: HARDWARE AND DIGITAL SECURITY

9th - 12th Grade

35 Qs

Software Testing in Java

Software Testing in Java

1st Grade - University

25 Qs

Quiz Microsoft Excel

Quiz Microsoft Excel

10th Grade - University

30 Qs

Code HS Computer SCi 114.1.1 JavaScript Final Exam Pt. 1

Code HS Computer SCi 114.1.1 JavaScript Final Exam Pt. 1

9th - 12th Grade

25 Qs

Quiz 3.1 - Operating Systems

Quiz 3.1 - Operating Systems

9th - 12th Grade

29 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

35 Qs

Server 1 Day 8 Review

Server 1 Day 8 Review

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Rehan Ahmed

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of the "useradd" command?

To delete user accounts

To create new user accounts

To modify user account passwords

To display user account details

Answer explanation

The primary function of the 'useradd' command is to create new user accounts in a system. It does not delete accounts, modify passwords, or display details, making 'To create new user accounts' the correct choice.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file is used to store user account information, including usernames and user IDs?

/etc/shadow

/etc/passwd

/etc/group

/etc/login

Answer explanation

/etc/passwd is the file that stores user account information, including usernames and user IDs. It contains essential details for user management, while /etc/shadow holds password hashes and /etc/group contains group information.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a UID in Linux user account management?

Unique Identification for Device

User Identification number

Unified Internet Directory

User Identification data

Answer explanation

A UID, or User Identification number, is a unique numeric identifier assigned to each user account in Linux. It distinguishes users and is essential for managing permissions and access control within the system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "passwd" command allow users to do?

Create a new user account

Change their own password

Display the user account details

Modify user group settings

Answer explanation

The 'passwd' command is used by users to change their own password. It does not create user accounts, display account details, or modify group settings.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about the root user account?

It is disabled by default in most modern distributions

It is a system account with limited access

It can read and write every file on the computer

It is used for creating and managing groups

Answer explanation

The root user account has full access to the system, allowing it to read and write every file on the computer. This is essential for system administration tasks, unlike limited access accounts.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file stores encrypted passwords in Linux?

/etc/shadow

/etc/passwd

/etc/group

/etc/login

Answer explanation

/etc/shadow is the file that stores encrypted passwords in Linux. It is more secure than /etc/passwd, which contains user account information but not encrypted passwords. /etc/group and /etc/login do not store passwords.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice for creating a secure password?

Use personal information like birthdates

Use simple keyboard combinations

Use random collections of letters, digits, and punctuation

Write it down on sticky notes

Answer explanation

The best practice for creating a secure password is to use random collections of letters, digits, and punctuation. This approach minimizes predictability and enhances security, unlike personal information or simple combinations.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)