For the accompanying inquiries enter the answer and give complete explanation or rational for your answer with examples and charts when required. enter the screen showing execution the execution of the command in Linux workstation alongside the clarification (you might have the capacity to utilize the Linux command brief in your Mac\'s) 1. What command can you use to manually connect to a drive that does not automatically appear when connected to the system? A. partition B. fstab C. fsck D. mount Explanation: 2. You must dispose of a hard drive that once contained sensitive data. What command can you use to securely wipe the drive contents? A. wipe B. diskerase C. fdisk D. dd Explanation: 3. What directory on a Linux system normally contains files for commands used by the root user? A. /boot B. /root C. /sbin D. /bin Explanation: 4. Where on a Linux system would you find the shadow password file? A. /bin B. /var C. /etc D. /root : Explanation: 5. You are experiencing issues on your Linux system and need to access logs for troubleshooting purposes. Where are the files located? A. /usr B. /root C. /var D. /log Answer: Explanation:
Solution
1.
Answer. D
All files accessible in a Linux system are arranged in one big tree, the file hierarchy rooted at /.
The mount command serves to attach the filesystem found on some device to the big file tree. Conversely, the umount command will detach it again.
The standard form of the mount command is :
mount -t type device dir
2. A
Wipe - securely erase files from magnetic media.
3. Answer : C
/sbin is a standard subdirectory of the root directory in Linux and ohter Unix-like operating systems that contains
executable programs. They are mostly administrative tools, that should be made available only to the root (i.e., administrative) user.
4). Answer : C
/etc directory contains shadow file.
shadow is a file which contains the password information for the system\'s accounts and optional aging information.
This file must not be readable by regular users if password security is to be maintained. Each line of this file contains 9 fields, separated by colons(\":\"). in the following order.
1. Login name
2. encrypted password
3. date of last password change
4.minimum password age
5. maximum password age
6.password warning period.
7. password inactivity period.
8. account expiration date
9. reserved field.
5) Answer : C
Almost all logfiles are located under /var/log directory and its sub-directories on Linux. You can change to this directory using the cd command. you need to be the root user to vies or access log files on Linux.
.
Beyond the EU: DORA and NIS 2 Directive's Global Impact
For the accompanying inquiries enter the answer and give complete expl.docx
1. For the accompanying inquiries enter the answer and give complete explanation or rational for
your answer with examples and charts when required. enter the screen showing execution the
execution of the command in Linux workstation alongside the clarification (you might have the
capacity to utilize the Linux command brief in your Mac's) 1. What command can you use to
manually connect to a drive that does not automatically appear when connected to the system? A.
partition B. fstab C. fsck D. mount Explanation: 2. You must dispose of a hard drive that once
contained sensitive data. What command can you use to securely wipe the drive contents? A.
wipe B. diskerase C. fdisk D. dd Explanation: 3. What directory on a Linux system normally
contains files for commands used by the root user? A. /boot B. /root C. /sbin D. /bin Explanation:
4. Where on a Linux system would you find the shadow password file? A. /bin B. /var C. /etc D.
/root : Explanation: 5. You are experiencing issues on your Linux system and need to access logs
for troubleshooting purposes. Where are the files located? A. /usr B. /root C. /var D. /log
Answer: Explanation:
Solution
1.
Answer. D
All files accessible in a Linux system are arranged in one big tree, the file hierarchy rooted at /.
The mount command serves to attach the filesystem found on some device to the big file tree.
Conversely, the umount command will detach it again.
The standard form of the mount command is :
mount -t type device dir
2. A
Wipe - securely erase files from magnetic media.
3. Answer : C
2. /sbin is a standard subdirectory of the root directory in Linux and ohter Unix-like operating
systems that contains
executable programs. They are mostly administrative tools, that should be made available only to
the root (i.e., administrative) user.
4). Answer : C
/etc directory contains shadow file.
shadow is a file which contains the password information for the system's accounts and optional
aging information.
This file must not be readable by regular users if password security is to be maintained. Each line
of this file contains 9 fields, separated by colons(":"). in the following order.
1. Login name
2. encrypted password
3. date of last password change
4.minimum password age
5. maximum password age
6.password warning period.
7. password inactivity period.
8. account expiration date
9. reserved field.
5) Answer : C
Almost all logfiles are located under /var/log directory and its sub-directories on Linux. You can
change to this directory using the cd command. you need to be the root user to vies or access log
files on Linux.