QUESTION 48 Which of the following umask settings will result in new files receiving the default permissions -rw---? O a. 0177 O b.0600 O c. 0688 O d.0188
Q: Which of the following is true of group accounts? (Choose all that apply.) a. They organize users…
A: Basically Group Accounts are those accounts which are accessed by a group of individuals. In this…
Q: which of the following commands is used to run a following command as a privileged user ? a) runas…
A: To run a command as a privileged user means that a command that cannot be used by a normal user can…
Q: Following the execution of the command umask 731, the permissions of all newly created files and…
A: Introduction; Permissions: In Linux operating system, the permissions are written in the format…
Q: Which of the following commands will change the user ownership and group ownershipof file1 to user1…
A: "chown" command: In Linux operating system, "chown" command is used to change the group ownership…
Q: Which command is used to delete files and directories?
A: Command to delete file: rm filename If the file is in another directory, first change the directory…
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: at command in linux is used to schedule a job to execute on perticular time.at command to run a…
Q: Which option to the dpkg command can be used to list the files that comprise apackage?a. –lb. –Lc.…
A: “dpkg” command: The “dpkg” is a tool which is a package manager for Debian/Debian-based systems.…
Q: What does the IOS command "end" do? O a. it goes directly to privilege mode O b. it quits the CLI O…
A: a. it goes directly to privilege mode
Q: ich one of the following tool deletes your files/data permanently. a. Change Directory b. SDelete c.…
A: Given: Which one of the following tool deletes your files/data permanently.
Q: A user runs the fsck command with the -a option on a filesystem that is showing signsof corruption.…
A: "fsck" command: File system check order is the sixth field of the line that allows "fsck" to check…
Q: SECTION B below. Write Linux commands to complete the actions below bin tmp usr var etc home opt bin…
A: Our bounded restrictions are to answer the first three subparts only. - The question is to…
Q: BELOW MCQ GIVEN ANSWER CAN BE MORE THAN ONE OPTION. PLEASE PROVIDE CORRECT ANSWERS.…
A: ANSWER C
Q: IV. Write a command to add user account with these properties a. Name fedora b. ID-???, it's the…
A: The above question is solved in step 2:-
Q: After typing the command umask 731, the permissions on all subsequently created filesand directories…
A: Permissions: In Linux operating system, the permissions are written in the format where, The…
Q: Which of the following commands creates an archive?a. tar –cvf /dev/st0b. tar –xvf /dev/st0c. tar…
A: In Linux OS , tar command is used to make file archive and extract the archived file. It is an…
Q: Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is…
A: This mcq is based on NTFS permissions.
Q: Along with a listing of user accounts, the /etc/passwd file contains information onaccount expiry.…
A: In Linux, information about all the users in the system is stored in the configuration file…
Q: Question 8 options: In Linux, which command to use to check how to use ls command? (case sensitive)…
A: I have provided a solution in stp2
Q: Which of the following commands locates the current directory in the directory hierarchy? wcd pwd…
A: Step 1 The correct answer is given in the below step with an explanation.
Q: Which dump level indicates a full backup?a. 0b. 9c. 1d. f
A: Dump level indicates The dump is used to backup files or restore the files. The Dump level backup…
Q: The utility shutdown belongs to which directory of the file system? /dev /proc /bin /sbin
A: The shutdown command allows you to halt, power-off, and reboot your Linux system.
Q: Which of the following is the Linux command to rename files? a. rename b. F11 C. mv d. Is
A: the answer ia an rename
Q: Use the man or info pages to find a description of the –D option to the useradd command.What does…
A: The “useradd” creates a new user or update default new user information. The “useradd” with “-D”…
Q: Which of the following CLI command can also be used to rename files? a) rm b) mv c) rm -r d) none of…
A: Question. Which of the following CLI command can also be used to rename files? a) rm b) mv c) rm -r…
Q: Which command is used to display the amount of free space that exists on a filesystem?a. fsckb.…
A: Command for displaying the amount of free space The "df" command is used for knowing the amount of…
Q: After typing the command umask 731, what will the permissions on all new created files be
A: Umask, or the user file-creation mode is a Linux command that is used to assign the default file…
Q: 1]which command is used to compress a file? a. grip b. lpr c.compress d.none of the above
A: About command is used to compress a file
Q: n Linux Create a simple backup script to create a backup of the directory “Script2”. This script…
A: Shell script #!/bin/bash source=/home/script2dest=/home/backup echo "start copying files..." for…
Q: f. Write the command to show the contents of the file courses.txt. g. Write the command to change…
A: - We need to show the content of file named course.txt and change the working directory to work1.
Q: In JSLinux ,which of the following UNIX command can be used in absolute mode that grant the…
A: The correct answer is chmod 611 Read.txt i.e., option c. Chmod 611 (chmod a+rwx,u-x,g-rw,o-rw)…
Q: Which command entered without arguments is used to display a list of processes runningin the current…
A: Linux is a multitasking framework and a multi-user system, as we all know. So, by interacting with…
Q: You have just created a new account on your server and you would like to make sure that all the…
A: The umask goes about as a bunch of consents that applications can't set on documents. It's a…
Q: Why do I have two files with the same name in my account? Assume your home directory is active.…
A: Yes, on the UNIX/LINUX Operating System, it is possible to have two files with the same filename…
Q: Which of the following commands checks a file system for errors? a. cd b. ping C. cls d. chkdsk
A: Hello Student. Warm welcome from my side. Hope you are doing great. Here's your answer.
Q: Which of the following is the default permission set for the /root directory? O a. drwxrwxrwx O b.…
A: The default permission for the root directory is as follows:
Q: What is the name of the file that contains a listing of all users on the system and theirhome…
A: Name of file listing all users on the system /etc/passwd file is used for keeping track of every…
Q: Which file contains full and incremental back-up information for use with the dump/restore…
A: File containing full and incremental back up information The /etc/dumpdates contains tracking of…
Q: Which of the following UNIX command can be used in symbolic mode to grant the following permissions…
A: r = read w =write x =executer - sign indicates that particular permission has been removed b…
Q: We have a series of folders in the current folder which are named with permission codes (example:…
A: Directory structure.
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Command will change working directory from /usr/users/joe to /usr is cd directory. As cd command is…
Q: Which one of the following commands can be used to secure the privilege exec mode by using the…
A: Which of the following commands can be used to secure the privilege exec mode by using the plaintext…
Q: Which of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1,…
A: “chkconfig” command can be used to start a particular daemon in the required run levels. “chkconfig…
Q: Which of the following command can be used to remove the test DPM package, includingany test…
A: Explanation: There is only a small difference between “remove” and “purge” command. The “remove”…
Q: Which of the following Linux commands can you use to make the following script executable? Assume…
A: The chmod Command in Linux stands for Change Mode in LINUX, which is a function to change / modify /…
Q: Which of the following commands can be used to list the files contained within aninstalled RPM…
A: RPM command: RPM stands for Red Hat Package Manager is an default open source and most popular…
Q: Which of the following is a good practice ? A. Give full permission for remote transferring B.…
A: Given: Which of the following is a good practice ? A. Give full permission for remote transferringB.…
Q: What does the du /var command do?a. shows the users connected to the /var directoryb. shows the size…
A: In Linux/Unix operating system, to get the disk usage information du command is used. It is also…
Q: Which of the following command allows you to change directory to one level above your parent…
A: Question. Which of the following command allows you to change directory to one level above your…
48 number solution needed
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second? a. Check the C:\User\Belinda Lim\Documents folder. b. Check the C:\Users\Belinda Lim\Documents folder. c. Use the chkdsk command. d. Use the sfc command.Following the execution of the command umask 731, the permissions of all newly created files and folders will be altered.What will the permissions be on all new files in this case? a. rw-rw-rw b.rwxrw-r--c. -- -r--rw d.-- --wx--xQuestion 5 Given a file that appears on "ls -l" as follows... -rw-r--r--. 1 montclair MSU 39 Jan 16 20:15 test.txt ..after issuing the command, "chmod 754 test.txt", what would the new permissions look like? Group of answer choices: a. -rwxr-xr--. b. -rw-------. c. -rwxr-xr-x. d. -rwxr--r-x. Full explain this question and text typing work only thanks
- Write the command that can be used to perform the following:a. Back up the contents of the /var directory (which contains symbolically linked files)to the second nonrewinding SCSI tape device on the system using the tar utility.b. Append the file /etc/inittab to the archive created in Exercise 3a.c. Create a tarball called /stuff.tar.gz that contains all files in the /root/stuff directory. d.Use the cpio utility to back up all files in the /var directory (which contains symbolicallylinked files) to the first rewinding IDE tape device that has a block size of5KB.e. Perform a full filesystem backup of the /var filesystem using the dump utility andrecord the event in the /etc/dumpdates file.f. View the contents of the archives created in Exercises 3a, c, d, and e.g. Extract the contents of the archives created in Exercises 3a and c to the /rootdirectory.h. Extract the contents of the archives created in Exercises 3d and e to their originallocations.Write the command that can be used to perform the following: Back up the contents of the /var directory (which contains symbolically linked files) to the second nonrewinding SCSI tape device on the system using the tar utility. Append the file /etc/inittab to the archive created in Exercise 2a. Create a tarball called /stuff.tar.gz that contains all files in the /root/stuff directory. Use the cpio utility to back up all files in the /var directory (which contains symbolically linked files) to the first rewinding IDE tape device that has a block size of 5KB. Perform a full filesystem backup of the /var filesystem using the dump utility and record the event in the /etc/dumpdates file. Create an image of the /dev/sdb4 filesystem to the /sdb4.img file. View the contents of the archives created in Exercises 2a, 2c, 2d, and 2e. Extract the contents of the archives created in Exercises 2a and 2c to the /root directory. Extract the contents of the archives created in…Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod +w *.py e) grep -n ‘^[D-H]’ filename f) rm -rf dir1 How likely would you use the -f flag with the rm utility in the last command? Is it a safe way to manipulate directories?
- Can someone show me a NTFS permission screenshot of what this would be? The “FWC-EMPLOYEES” folder/directory is available to all FWC employees to place additional data (files/folders), but NO OTHER EMPLOYEE (other than sys admins!) should be able to modify, edit, delete, etc. ANY data they did NOT PUT INTO THIS FOLDER.Write the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.25السؤال What are the permission of file01 after executing this command? chmod 777 file01 الاجابات rwxr--rwx rwxrwxr-- rwxr-xrwx rwxrwxrwx
- In Linux code: Write one cmd-line for each of the following using chmod.a. to set the permissions of the directory $HOME/ctmp to read only for user, read and write for group and no perms for other. Do not use permission numbers. Assume that ctmp exists in your home directory, or you can create the dir to help test your answer.b. to change permissions of $HOME/project from 755 to 441.The command find . -name "*.png" will send to stdout a list of all the files in the current directory and all of its descendent directories that have a .png extension. Give a command that uses command substitution to copy all such files to the directory ~/imagesYou need to send a backup copy of the /etc directory across the network. To create the file, use the tar command with the -cf switches to create a new archive file. Use -z as the preceding option to compress the file. In this lab, your task is to: Create a compressed archive of the /sales directory and all its contents Name the file /salesbkp.tar.gz and save it in the root directory (/).