Which two commands create a role of helpdesk and assign the Printer Administration profile to it, and then add
You are configuring a remote server. Your help desk technicians need the ability to do printer administration. Because of sensitive data on this system, you cannot grant the help desk technicians full root access.
Which two commands create a role of helpdesk and assign the Printer Administration profile to it, and then add a help desk technician with a userid of roger to that role? (Choose two.)
Which two commands add the authority to the helpdesk4 user to change user passwords, but only allow read-only
You are setting up a new help desk technician. The help desk technician is responsible for administering all user privilege aspects. The technician must be able to answer user requests for forgotten passwords and set and change user passwords.
The new technician must also be able to read the configuration files related to other users. However, the technician’s supervisor must make any changes that are required.
The help desk technician will use the login name of helpdesk4. The userid of helpdesk4 has already been created as an unprivileged user.
Which two commands add the authority to the helpdesk4 user to change user passwords, but only allow read-only access to user and role configuration files? (Choose two.)
Which RBAC command helps you find the attributes commands that are executed for a particular user?
Which RBAC command helps you find the attributes commands that are executed for a particular user?
what is the default shell?
Your system is newly built and has a default set up. When you add an account using roleadd, what is the default shell?
what is the sequence of events to execute this process?
You must set up three users to administer the artwork department. These users will be launching several applications with the EUID of department administrator.
Using the RBAC mechanism, what is the sequence of events to execute this process?
What is the result when the user tries to run the crontab command?
A user has an entry in both of the files that manage access to the crontab command. What is the result when the user tries to run the crontab command?
Which entry should you place in the appropriate file to achieve this?
You receive a request to set up trusting for user1 when user1 logs in to system1 from system2.
Which entry should you place in the appropriate file to achieve this?
What is the EUID and the EGID of the new user?
Given:
#id
uid=101(user1) gid=10(user1)
#su user2
and
#tail -2 /etc/passwd
user1:x:101:10:/export/home/user1:/bin/ksh
user2:x:102:11:/export/home/user2:/bin/ksh
What is the EUID and the EGID of the new user?
Which two statements are true?
You are informed that an unprivileged user has executed commands as the superuser. You decide to look at the log file for the su(1) command. The contents in the log file are:
SU 12/07 11:50 + pts/6 gv1123-root
SU 12/07 11:54 – pts/5 fb12-root
SU 12/07 11:54 + pts/3 gv1123-root
SU 12/07 12:03 + pts/1 jjj-gv1123
You know the file has NOT been tampered with. Which two statements are true? (Choose two.)
Which file does the who command read to obtain its output?
A user contacts the help desk to report that a script run by the user’s department is reporting an error. The script checks for who is logged in. Your first action is to make sure that the file that the who command reads for its output, is present.
Which file does the who command read to obtain its output?