Home > Articles

This chapter is from the book

This chapter is from the book

Review Questions

The answers to these review questions are in Appendix A.

1. After configuring the PolicyKit rules for your system, what command would you use to use those rules when executing a target command that your current user doesn’t have rights to execute alone?

  1. sudo

  2. pkexec

  3. suexec

  4. execit

2. When configuring the sudo command, what is the full path and filename of its primary configuration file?

____________

3. You are able to access a remote system using just a passphrase for authentication. What must you have copied from your system to the remote system in order for this to happen?

  1. Your personal public key

  2. The system’s public key

  3. The wheel group’s public key

  4. The remote user’s private key

4. When configuring your system to allow or deny certain groups or users to sign in via SSH, what is the full path and filename of the configuration file where these settings are kept?

____________

5. If you invoke the ssh command with the -X option, what are you likely to be doing after you sign on to the remote system?

  1. Just standard commands

  2. Running xeyes locally and displaying remotely

  3. Running X11 on the remote system and displaying locally

  4. Running remote X apps that display locally

6. Which of the following commands is specifically designed to make it more secure to edit files when using sudo to elevate your privileges?

  1. sudovim

  2. visudo

  3. sudoedit

  4. nanobot

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.