groups gshantYou suspect that the gshant user account is locked. Which command will show the status of the useraccount?passwd -S gshantYou want to keep the gshant user from editing his respective crontab file in /var/spool/cron, but stillallow all other users on the system to edit their respective crontab file. Which file should you edit?/etc/cron.deny
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Discrete Mathematics With Applications
Epp
Expert Verified
Which file on a Debian Linux distribution displays the time zone settings?/etc/timezoneUser accounts:Control the ability to log on to a system, access resources, and perform certain actions.Groups:Provide a means of grouping users for administrative purposes such as assigning permissions to files.Standard userStandard user accounts can log into the system.Standard user accounts:-Have friendly usernames (such as mary or bkaun). An administrator must create the user names.-Have an ID of 500 or more for Fedora, or 1000 or more for SUSE. The ID is automatically assigned by thesystem when the account is created.System userSystem user accounts are created by default during the Linux installation and are used by the system forspecific roles.System user accounts:-Have names that correspond with their roles, such as ftp and mail.-Cannot be used to log into the system.
Note: The root user account is created by default and has a UID of 0; however, it can be used to log into asystem and perform tasks.Primary groupPrimary groups (also called the private group) are created when a standard user is created.Primary groups:-Have the corresponding user as the only member.-Are automatically made the owner of files and directories when they are created.-Are similar to any other group; however, the only difference is that the user account specificallyidentifies the primary group for each user.Secondary groupsSecondary groups are used to manage access to files and directories. Secondary groups:-Have friendly names (such as sales or accounting).-An administrator must assign secondary group names.-Receive their membership as assigned by the system administrator./etc/passwdHolds user account information.Note:-Each entry identifies a user account.-Each entry contains multiple fields, with each field separated by a colon.
Example:The following line is a sample entry in the /etc/passwd file:pclark:x:501:501:Petunia Clark:/home/pclark:/bin/bashThe fields within this line are as follows:1.User account name.2.Password. An x in the field indicates passwords are stored in the /etc/shadow file.3.User ID number.4.Primary group ID number (also known as the default group ID number). Typically this number matchesthe UID number.5.GECOS field. This field is typically used for a description or the user's full name.6. Path to the home directory.7. Path to the default shell./etc/shadowHolds passwords and password expiration information for user accounts.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document