For the accompanying inquiries enter the answer and give complete explanation or
ID: 3697553 • Letter: F
Question
For the accompanying inquiries enter the answer and give complete explanation or rational for your answer with examples and charts when required. enter the screen showing execution the execution of the command in Linux workstation alongside the clarification (you might have the capacity to utilize the Linux command brief in your Mac's)
1. What command can you use to manually connect to a drive that does not automatically appear when connected to the system?
A. partition
B. fstab
C. fsck
D. mount
Explanation:
2. You must dispose of a hard drive that once contained sensitive data. What command can you use to securely wipe the drive contents?
A. wipe
B. diskerase
C. fdisk
D. dd
Explanation:
3. What directory on a Linux system normally contains files for commands used by the root user?
A. /boot
B. /root
C. /sbin
D. /bin
Explanation:
4. Where on a Linux system would you find the shadow password file?
A. /bin
B. /var
C. /etc
D. /root :
Explanation:
5. You are experiencing issues on your Linux system and need to access logs for troubleshooting purposes. Where are the files located?
A. /usr
B. /root
C. /var
D. /log
Answer:
Explanation:
Explanation / Answer
1.
Ans: B. fstab
The /etc/fstab file can be used to define how disk partitions, various other block devices, or remote filesystems should be mounted into the filesystem.
Each line in the /etc/fstab file contains the following fields separated by spaces or tabs:
file_system dir type options dump pass
file system
The partition or storage device to be mounted.
dir
The mountpoint where <file system> is mounted to.
type
The file system type of the partition or storage device to be mounted. Many different file systems are supported: ext2, ext3, ext4, btrfs, reiserfs, xfs, jfs, smbfs, iso9660, vfat, ntfs, swap and auto. The auto type lets the mount command guess what type of file system is used. This is useful for optical media (CD/DVD).
options
Mount options of the filesystem to be used. See the mount man page. Please note that some options are specific to filesystems; to discover them see below in the aforementioned mount man page.
dump
Used by the dump utility to decide when to make a backup. Dump checks the entry and uses the number to decide if a file system should be backed up. Possible entries are 0 and 1. If 0, dump will ignore the file system; if 1, dump will make a backup. Most users will not have dump installed, so they should put 0 for the dump entry.
pass
Used by fsck to decide which order filesystems are to be checked. Possible entries are 0, 1 and 2. The root file system should have the highest priority 1 (unless its type is btrfs, in which case this field should be 0) - all other file systems you want to have checked should have a 2. File systems with a value 0 will not be checked by the fsck utility.
2.
A. wipe
wipe - securely erase files from magnetic media
Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent to recover the last two or three layers of data written to disk; wipe repeatedly overwrites special patterns to the files to be destroyed
3.
D. /bin
/bin – User Binaries
Contains binary executables.
Common linux commands you need to use in single-user modes are located under this directory.
Commands used by all the users of the system are located here.
For example: ps, ls, ping, grep, cp.
4.
C. /etc
In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system. Ordinarily, user information, including passwords, is kept in a system file called /etc/passwd .
5.
C. /var
/var:
Contains variable data like system logging files, mail and printer spool directories, and transient and temporary files. Some portions of /var are not shareable between different systems. For instance, /var/log, /var/lock, and /var/run. Other portions may be shared, notably /var/mail, /var/cache/man, /var/cache/fonts, and /var/spool/news.