Page 226 - DCAP602_NETWORK_OPERATING_SYSTEMS_I
P. 226
Network Operating Systems-I
notes 4. You can change the ownership of a file with the ..................... command.
5. If a server needs to be administered by a number of people it is ..................... not a good idea
for them all to use the root account.
6. All commands run as ..................... are logged in the log file /var/log/messages.
7. The ..................... command allows a regular user to become the system’s root user if they
know the root password.
8. The ..................... command is a text editor that mimics the vi editor that is used to edit the
/etc/sudoers configuration file.
9. The ..................... file contains all the configuration and permission parameters needed for
sudo to work.
10. The sudo -u entry allows you to ..................... a command as if you were another user.
11. All sudo commands are ..................... in the log file /var/log/messages which can be very
helpful in determining how user error may have contributed to a problem.
12. The ..................... account is meant to be used by the System Administrator to perform
certain duties which can be destructive and therefore should only be performed by an
expert.
13. Before ..................... a command with sudo, users usually supply their password.
14. A “root” user has the ..................... to do anything on a Linux system.
15. ..................... are needed for tasks that require higher privileges than those which a common
user has.
11.7 review Questions
1. What are the main steps to become Superuser in Linux?
2. Make a detailed critical evaluation of the Super user.
3. What do think are the limitations and advantages of the super user?
4. How do you foresee the future of super user?
5. What is the processor to add users?
6. Analyse the various ways to Change Passwords and delete users
7. Explain the ways to predict the groups of the user to which it belongs.
8. Write short note on:
(a) User and SuperUser.
(b) Creating Groups
(c) Deleting a Group
(d) Modifying Group Membership
(e) SetUID and SetGID Programs
9. What are the principal weaknesses of Normal Users in Linux?
10. What are major directions to let normal users shut down the computer in Linux?
220 LoveLy professionaL university