Book: LPI Linux Certification in a Nutshell
Section: Chapter 8.  Exam 101 Review Questions and Exercises



8.5 Administrative Tasks (Topic 2.11)

8.5.1 Review questions

  1. Why is it considered insecure to store encrypted passwords in /etc/passwd ?

    1. What is the alternative?

    2. When the alternative is implemented, what happens to the password field in /etc/passwd ?

  2. What would happen to a user account if the default shell were changed to /bin/false ?

  3. When a new account is created with useradd -m, what files are used to populate the new home directory?

  4. Compare and contrast the execution of /etc/profile and /etc/bashrc.

  5. What is the complete filename for the file where most syslog messages are sent?

  6. Describe the three syslog parameters: facility, level, and action.

  7. Compare and contrast cron and at.

  8. Is there a cron command?

  9. State the format of a crontab file, describing each of the six fields.

  10. What does an asterisk mean in crontab fields 1 through 5?

  11. Compare and contrast the differential and incremental backup methods.

  12. Why is mt usually used along with tar to implement simple backup schemes?

    1. What special measures must be taken with regard to device names when using mt for multiple-volume tar backups?

8.5.2 Exercises

8.5.2.1 Exercise 2.11-1. User accounts
  1. Examine the /etc/passwd file on your system.

    1. Is this the only means of user authentication on your system?

    2. Are shadow passwords in use?

    3. Are user accounts handled by NIS or are they all local?

  2. Repeat the first exercise for groups.

  3. If you have an expendable system available, experiment with implementing shadow passwords.

  4. Add a user with useradd, including a new home directory populated with files from /etc/skel.

  5. Add a group with groupadd.

  6. Use usermod to add your new user to the new group.

  7. Set the new user's password using passwd.

  8. Log into the new account, and use newgrp to change to the new group.

  9. Delete the new group and user (including home directory) using groupdel and userdel.

8.5.2.2 Exercise 2.11-2. User environment and variables
  1. Examine the contents of /etc/skel. How similar are they to your own home directory?

  2. Review the contents of /etc/profile and /etc/bashrc.

8.5.2.3 Exercise 2.11-3. Syslog and log files
  1. Add the local5 facility to your configuration as described in Section 7.3. Use logger to write to your new log file, and verify its contents. Compare your log entries with those in /var/log/messages.

  2. Examine /etc/logrotate.conf. What happens after /var/log/messages is rotated?

8.5.2.4 Exercise 2.11-4. cron and at
  1. Add an entry in your personal crontab file to perform a task, such as sending you an email message. Confirm that the action occurs as expected. Experiment with the five time specifiers.

  2. Schedule a command in the future with at. How is at different from cron?

8.5.2.5 Exercise 2.11-5. Backup
  1. Imagine that you have recently been made responsible for an important production system. No formalized backup procedures are in place. Backup operations that are run are not cataloged and media are scattered. Now imagine that after a holiday weekend the system has crashed due to a power failure. Upon restart, the system has severe disk errors requiring manual fsck. After repairs are complete, the system is again usable, but users complain about missing, truncated, or corrupt files. If a formalized backup procedure had been in place, would the outcome have been different?

  2. If you have a tape drive available, experiment with tar, creating small tarfiles on a tape.

    1. Using the nonrewinding tape device, create multiple archives on the tape, and use mt to position among them.

    2. Verify that the various archives you create are accessible to tar.