Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What is the command to remove read and write permissions for the group and others from a file? - ` chmod go - rw filename

What is the command to remove read and write permissions for the group and others from a file?
-`chmod go-rw filename`
-`chmod gu+rw`
-`chmod gu-rw`
-`chmod go-rw`
2. The TCP/IP model does not have _________________ layer, but the OSI model has this layer.
- Application layer
- Session layer
- None of the above
- Transport layer
3.___________ command is the syntax to change the password of a user called manAyaala.
-`pword manAyaala`
-`ps manAyaala`
-`password manAyaala`
-`passwd manAyaala`
4. Which of these users have complete control over the system, including the ability to modify system files, install software, and perform administrative tasks?
- Group
- System
- Regular
- Root
5. Firms that allow employees to use their own devices are embracing which of the following?
- BYOD
- Mobile consolidation
- Cloud computing
- Wearable computing
6. Which of these is a fundamental purpose of a loopback address?
- Isolation
- Development and testing
- All of the above
- Local testing
7. In which file does the actual password hashes stored in Ubuntu?
-/etc/shadow
-/etc/password
-/etc/passwd
-/etc/shadow.config
8. What is not a challenge to a system administrator?
- Automated Backups
- Providing a comfortable environment for users.
- Planning and implementing adequate security.
- Developing ways of fixing errors and problems which occur.
9. Which of these is a feature of a network operating system?
- Protocol Support
- Monitoring and Troubleshooting
- Directory service
- All of the above
10. The fields in the password file are __________ separated.
- Colon
- Comma
- None of the above
- Semi-Colon
11. The user with complete control over the system, including the ability to modify system files, install software, and perform administrative tasks, is known as ___________.
- Group
- System
- Regular
- Root
12. When a file or directory is owned by a group, all members of that group ____________ the permissions associated with the group.
- Advance
- Sustain
- Inherit
- Maneuver
13. Which of these commands can be used to view the account aging information for a specific user?
- chnge
- change
- chage
- chge
14. Which of these is not a reason for updates to be automated?
- All of the above
- Completeness
- Scale
- Deploy
15. The ______________ command can be used to view detailed information about a user called Ayaala.
- fig Ayaala
- finger Ayaala
- f Ayaala
- figer Ayaala
16. A device designed to provide services or resources to other devices on the network is considered as _____________.
- Infrastructure
- Mobile device
- Workstation
- Server
17. Which of these commands can help you display your working directory after logging into the system?
- pwd
- ls
- cat
- dtory
18. Which of these are strategies for bringing server resources to an organization?
- All eggs in one basket
- All of the above
- Beautiful snowflakes
- Buy in bulk, allocate fractions
19. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
-255.255.255.255
-255.255.255.252
-255.255.255.240
-255.255.255.248
20. Which of these is a feature of the software patch?
- Add a new feature
- Close security holes
- Fix bugs
- All of the above
21. The physical layer is concerned with_______________.
- Application to application delivery
- None of the above
- Process to process delivery
- Bit-by-bit delivery
22. What is the group name of this entry in a group file adm:x:4:syslog,username1.
- Syslog
- Adm
- X
- Username1
23. Which of these users of Ubuntu are non-users?
- Group
- System
- Regular
- Root
24. Which of these is a device that acts as a connection point between computers and can filter and forward data to a specified destination?
- Router
- NIC
- Hub
- Switch
25. This octets of IPV411000001000010110000101111101111 represent which class of the following IP addresses?
- A
- D
- C
- B
26. Software that manages the resources of the computer is called ____________.
- Application software
- Network software
- Operating system software
- Data management software

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases Illuminated

Authors: Catherine M Ricardo, Susan D Urban

3rd Edition

1284056945, 9781284056945

More Books

Students also viewed these Databases questions

Question

=+c) State the null and alternative hypotheses.

Answered: 1 week ago