Académique Documents
Professionnel Documents
Culture Documents
1 out of 1 points
Using octal mode, enter the command that will change the permission set of the file into
the following:
r-------x
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
Case Sensitive
Question 2
1 out of 1 points
Your boss asked you to create a new directory called sample_dir. His requirements also
specified that upon creation, the directory needs to have the following permission set by
default:
Enter the full command that will ensure that all directories created in your unix box will
have the permission set such as the above.
Selected Answer:
umask 505
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
umask 505
Case Sensitive
Question 3
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 3
Selected Answer:
executable
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
executable
Exact Match
execute
Case Sensitivity
Question 4
1 out of 1 points
Using octal mode, enter the command that will change the permission set of the file into
the following:
rwxr-xr-x
Selected Answer:
Correct Answer:
Evaluation Method
Correct Answer
Case Sensitivity
Exact Match
Case Sensitive
Question 5
1 out of 1 points
The following command will list down all the files and subdirectories within a directory as
well as the permission set, user identification number and group identification number
associated with the files/directories:
ls -l
Selected Answer:
False
True
Answers:
False
Question 6
1 out of 1 points
Your boss asked you to create a new directory called sample_ dir. His requirements
also specified that upon creation, the directory needs to have the following
permission set by default:
Enter the full command that will ensure that all directories created in your unix box
will have the permission set such as the above.
Selected Answer:
umask 666
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
umask 666
Case Sensitive
Question 7
1 out of 1 points
Using octal mode, enter the command that will change the permission set of the file into
the following:
r-xr-xr-x
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
Case Sensitive
Question 8
1 out of 1 points
Enumerate the two modes used in chmod: (Note: do not put the word "mode" in the
blanks) [x] [y]
Specified Answer for: x
symbolic
octal
Correct Answer
Exact Match
octal
Exact Match
symbolic
Case Sensitivity
Correct Answer
Exact Match
octal
Exact Match
symbolic
Case Sensitivity
Question 9
1 out of 1 points
The initial permission value (without umask) specified by the system for a directory at the
time of its creation is ____
Selected Answer:
777
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
777
Question 10
1 out of 1 points
The initial permission value (without umask) specified by the system at the time
of file creation is ______
Selected Answer:
666
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
666
Question 11
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area
labeled as 1
Selected Answer:
owner
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
owner
Exact Match
owners
Exact Match
user
Exact Match
users
Case Sensitivity
Question 12
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 4
Selected Answer:
denied
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
denied
Question 13
1 out of 1 points
The following command will list down all the files and subdirectories within a directory as
well as the permission set, user name and group name associated with
the files/directories:
ls -n
Selected Answer:
Answers:
False
True
False
Question 14
1 out of 1 points
Every new file or directory has a set of default permissions assigned to it at the time of
creation.
Selected Answer:
True
Answers:
True
False
Question 15
1 out of 1 points
If the user has r access to a file, the user can display file contents and copy the file.
Selected Answer:
True
Answers:
True
False
Question 16
1 out of 1 points
x access to a directory does not mean that the user can use the cd command into the
directory.
Selected Answer:
False
True
Answers:
False
Question 17
1 out of 1 points
r------wSelected Answer:
402
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
402
Question 18
1 out of 1 points
If the user has w access to a directory, the user can modify the contents of a directory, such
as deleting a file. BUT the user must also have the execute permission for this to happen.
Selected Answer:
Answers:
True
True
False
Question 19
1 out of 1 points
-r-xr-x--We can conclude that cs201.sh has read and execute permissions set for the directory
owner and others only.
Selected Answer:
False
True
Answers:
False
Question 20
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 2
Selected Answer:
group
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
group
Exact Match
groups
Case Sensitivity
Question 21
1 out of 1 points
Using symbolic mode, how are you going to change the permission set from the one
specified above into the following:
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
Case Sensitive
Question 22
1 out of 1 points
The user mask affects the default file permissions assigned to the file or directory.
Selected Answer:
True
Answers:
True
False
Question 23
1 out of 1 points
-rwxr-xr-x
We can conclude that cs201.sh has read, write,and execute permissions set for the
group.Read and execute permissions are set for the owner and other.
Selected Answer:
False
True
Answers:
False
Question 24
1 out of 1 points
022
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
022
Question 25
1 out of 1 points
If no changes were made in the initial permission set of the file above, derive the umask
value used by the OS.
Selected Answer:
000
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
000
Exact Match
umask 000
Case Sensitivity
Question 26
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 2
Selected Answer:
writable
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
writable
Exact Match
write
Case Sensitivity
Question 27
1 out of 1 points
One of the security measures used in Unix to protect file and directory access
automatically is to assign a standard set of access permissions at the time of creation
of files and directories
Selected Answer:
Answers:
True
True
False
Question 28
0 out of 1 points
The chmod command enables you to fill in automatically any missing digits to the left
with zeros.
Selected Answer:
Answers:
False
True
False
Question 29
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 3
Selected Answer:
Correct Answer:
other
Evaluation Method
Correct Answer
Exact Match
other
Exact Match
others
Case Sensitivity
Question 30
1 out of 1 points
If the user has r access to a directory, the user can perform ls and cd commands into
this directory
Selected Answer:
False
True
Answers:
False
Question 31
1 out of 1 points
You can change the permissions set for files or directories by using the ______ command
Selected Answer:
chmod
Correct Answer:
Evaluation Method
Correct Answer
chmod
Exact Match
Case Sensitivity
Question 32
1 out of 1 points
Using the symbolic mode, enter a one-line command that will do the following:
1. Add execute access to the user/owner of the file
2. Revoke read access from "group" and "others"
Selected Answer:
Correct Answer:
Evaluation Method
Correct Answer
Case Sensitivity
Exact Match
Case Sensitive
Exact Match
Case Sensitive
Question 33
1 out of 1 points
Using symbolic mode, enter the command that will remove the read access of "others"
from the run-antivirus.sh script.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
Question 34
1 out of 1 points
If the user has w access to a file, the user can modify the contents of the file.
Selected Answer:
True
Answers:
True
False
Question 35
1 out of 1 points
-rwx------
We can conclude that cs201.sh has read, write, and execute permissions set for
the file owner only.Permissions for group and other are denied.
Selected Answer:
True
Answers:
True
False
Question 36
1 out of 1 points
_______ utility affects the initial permissions for files and directories when the files and
directories are created.
Selected Answer:
Umask
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
umask
Question 37
1 out of 1 points
rwxr-x--x
Selected Answer:
751
Correct Answer:
Evaluation Method
Exact Match
Correct Answer
Case Sensitivity
751
Question 38
1 out of 1 points
Given the image above as reference, identify the entity being represented by the area labeled as 1
Selected Answer:
readable
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
readable
Exact Match
read
Case Sensitivity
Question 39
1 out of 1 points
If the user has x access to a file, the user can execute the file if it is executable such as
shell script.
Selected Answer:
False
True
Answers:
False
Question 40
1 out of 1 points
If no changes were made in the initial permission set of the file above, derive
the umask value used by the OS.
Selected Answer:
022
Correct Answer:
Evaluation Method
Correct Answer
Exact Match
022
Exact Match
umask 022
Case Sensitivity