Introduction to Linux II Chapter 7

Last Updated on April 3, 2018 by Admin

Introduction to Linux II Chapter 7 Exam Answer

CCNA7.COM had tried to collect all chapter exam from candidate who has already taken exam.  There are 30 questions in Introduction to Linux II Chapter 7. Our team has modified and corrected all answers with 100% score before we published on this page. In Introduction to Linux II Chapter 7 exam, you should review all questions again and again before go to take online exam with NDG system.

  1. Question ID 1158

    A normal (non root) user has which type of access to the /etc/passwd file?

    • Read only
    • Execute, read, and write
    • Read and write
    • Write only
  2. Question ID 1159

    The /etc/passwd file can be modified by which of the following?

    • Remote user
    • Group account
    • Any user
    • Root user

  4. Question ID 1160

    A normal user, joe has the following record in the /etc/passwd file. What does the x indicate?


    • Password for user joe is locked
    • Password for user joe is x
    • joe has not yet set his password
    • The encrypted password has been stored in the /etc/shadow file
  5. Question ID 1161

    Refer to following record in the passwd file:


    UID and GID for test_user are, respectively:

    • 520 and 521
    • 21 and 20
    • 521 and 520
    • 521 and 1041

  7. Question ID 1162

    Which of the following info about users is not present in passwd file record?

    • The user’s shell
    • The user’s account name
    • The user’s home directory
    • The user’s password
  8. Question ID 1164

    Regular users can modify their GECOS information using which of the following commands?

    • set
    • finger
    • chfn
    • passwd
  9. Question ID 1165

    Which of the following commands CANNOT be used to update user information in the /etc/passwd file?

    • chfn
    • finger
    • useradd
    • usermod

  11. Question ID 1166

    The root user can convert the password of any user into readable text form.

    True or False?

    • True
    • False
  12. Question ID 1167

    Which of the following information is not stored in the /etc/shadow file?

    • Default home directory
    • Encrypted password
    • Days since last password change
    • Maximum number of days remaining for the password to expire
  13. Question ID 1168

    A regular user wants a password that never expires. The Maximum field value in the /etc/shadow file should be set to:

    • No value
    • *
    • 99999
    • 1
  14. Question ID 1169

    The system administrator wants to create a temporary user account to be used for only five days. Immediately after five days, the account should become unavailable for login. The following values should be set for the temporary user in the shadow file:

    • Maximum=5
    • Warn=5
    • Minimum=5
    • Expire date=today+5
  15. Question ID 1171

    In the /etc/shadow file, a user record has !! as the first two characters in the encrypted password field. What does this signify?

    • The password has !! as the first two characters
    • The password is about to expire
    • The account is locked
    • No significance, it is encrypted text

  17. Question ID 1173

    The system administrator wants to make the password empty for user Don. He should execute the passwd command with which of the following options?

    • –a Don
    • –d Don
    • –l Don
    • –u Don
  18. Question ID 1175

    A Linux administrator modifies the values of UID_MAX and UID_MIN parameters in the /etc/login.defs file. This in effect will allow her to:

    • Assign UID and GID within the specified range for all users
    • Assign GID within the specified range for new users
    • Change password expiration policy for existing users
    • Assign UID within the specified range for new users
  19. Question ID 1176

    The research team for ABC Corp is being increased from one to five members. What is the best way to add new team members to the server?

    • Create a group named research , with each member given an account belonging to the group.
    • Create a new login account named research that all new members share
    • Create individual users and assign them root privileges
    • Add new users with blank passwords
  20. Question ID 1177

    A user is a member of three different secondary groups. Which file will contain information regarding his membership in these secondary groups?

    • /etc/login.defs
    • /etc/passwd
    • /etc/shadow
    • /etc/group
  21. Question ID 1179

    The groups command displays your current primary group as the first group while the getent command will always display the default primary group.

    True or False?

    • True
    • False
  22. Question ID 1180

    An account on a Linux system has a UID of 50. Which type of account is this?

    • Temporary account
    • System account
    • Regular user account
    • Group account
  23. Question ID 1181

    Which option, when used with useradd command, will display the default options that are used when creating a new user?

    • –f
    • –D
    • –e
    • –m
  24. Question ID 1182

    A new user was created using the command useradd steve. The command grep steve/etc/shadow will show the password field for this account as:

    • Null
    • Blank
    • x
    • !!
  25. Question ID 1183

    Running the command useradd benon a system with User Private Groups will create:

    • A user ben and a group ben both are created
    • Only a new user ben is created
    • A user ben and login directory is created
    • Only a group ben is created
  26. Question ID 1185

    Changes in the /etc/skel directory will apply to:

    • All existing users
    • None – the /etc/skel directory has no effect on user accounts
    • New users having their home directory in /etc/
    • New users created using useradd command
  27. Question ID 1187

    The command passwd –S test_user produces the following output:

    test_user NP 03/28/2014 0 99999 7 -1

    What information does this convey regarding the password status of the test_user account?

    • There is no password
    • Locked password
    • New password stored in /etc/shadow
    • Set but non-printable password
  28. Question ID 1188

    Using the command passwd –e test_user, the root user can force a password change in the next login attempt.

    True or False?

    • True
    • False
  29. Question ID 1189

    The command chage CANNOT be used to:

    • Delete a user
    • Update information related to password expiry
    • View password aging policies
    • Enforce a password changing and expiry policy for specific user accounts
  30. Question ID 1190

    Which of the following commands will set the grace login period of 10 days after the password has expired?

    • chage –m 5 temp_user
    • chage –I 10 temp_user
    • chage –E “2014-06-01” temp_user
    • chage –W 10 temp_user
  31. Question ID 1192

    User lori reported that her account is locked. Which of the following commands will unlock her account?

    • usermod –L lori
    • usermod lori –e 2014-04-30
    • usermod –U lori
    • usermod lori –g sales
  32. Question ID 1193

    The system administrator wants to delete the user account joe. However, joe is already logged in to the system. Which of the following commands will allow the administrator to delete joe?

    • userdel –r joe_user
    • usermod –d –f joe_user
    • userdel joe_user
    • userdel –f joe_user
  33. Question ID 1194

    Which of the following commands will allow the root user to create a new group for the sales department and assign this new group the GID of 1250?

    • Specific GID cannot be assigned
    • groupadd sales_group 1250
    • groupadd sales_group –g 1250
    • groupadd sales_group –n 1250
  34. Question ID 1196

    The system administrator notices that a file shows a numeric group id 1508. What does this signify?

    • Group name corresponding to GID 1508 is deleted
    • The file belongs to a system group id
    • Group name is 1508
    • The system has been hacked