Page 226 - DCAP602_NETWORK_OPERATING_SYSTEMS_I
P. 226

Network Operating Systems-I




                    notes          4.   You can change the ownership of a file with the ..................... command.
                                   5.   If a server needs to be administered by a number of people it is ..................... not a good idea
                                       for them all to use the root account.
                                   6.   All commands run as ..................... are logged in the log file /var/log/messages.
                                   7.   The ..................... command allows a regular user to become the system’s root user if they
                                       know the root password.
                                   8.   The ..................... command is a text editor that mimics the vi editor that is used to edit the
                                       /etc/sudoers configuration file.

                                   9.   The ..................... file contains all the configuration and permission parameters needed for
                                       sudo to work.
                                   10.   The sudo -u entry allows you to ..................... a command as if you were another user.
                                   11.   All sudo commands are ..................... in the log file /var/log/messages which can be very
                                       helpful in determining how user error may have contributed to a problem.
                                   12.   The  .....................  account  is  meant  to  be  used  by  the  System  Administrator  to  perform
                                       certain duties which can be destructive and therefore should only be performed by an
                                       expert.
                                   13.   Before ..................... a command with sudo, users usually supply their password.

                                   14.   A “root” user has the ..................... to do anything on a Linux system.
                                   15.   ..................... are needed for tasks that require higher privileges than those which a common
                                       user has.

                                   11.7 review Questions

                                   1.   What are the main steps to become Superuser in Linux?

                                   2.   Make a detailed critical evaluation of the Super user.
                                   3.   What do think are the limitations and advantages of the super user?
                                   4.   How do you foresee the future of super user?
                                   5.   What is the processor to add users?
                                   6.   Analyse the various ways to Change Passwords and delete users

                                   7.   Explain the ways  to predict the groups of the user to which it belongs.
                                   8.   Write short note on:
                                       (a)   User and SuperUser.
                                       (b)   Creating Groups

                                       (c)   Deleting a Group
                                       (d)   Modifying Group Membership
                                       (e)   SetUID and SetGID Programs
                                   9.   What are the principal weaknesses of Normal Users in Linux?
                                   10.   What are major directions to let normal users shut down the computer in Linux?








          220                              LoveLy professionaL university
   221   222   223   224   225   226   227   228   229   230   231