Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For the accompanying inquiries enter the answer and give complete explanation or

ID: 3697553 • Letter: F

Question

For the accompanying inquiries enter the answer and give complete explanation or rational for your answer with examples and charts when required. enter the screen showing execution the execution of the command in Linux workstation alongside the clarification (you might have the capacity to utilize the Linux command brief in your Mac's)

1. What command can you use to manually connect to a drive that does not automatically appear when connected to the system?

A. partition

B. fstab

C. fsck

D. mount

Explanation:

2. You must dispose of a hard drive that once contained sensitive data. What command can you use to securely wipe the drive contents?

A. wipe

B. diskerase

C. fdisk

D. dd

Explanation:

3. What directory on a Linux system normally contains files for commands used by the root user?

A. /boot

B. /root

C. /sbin

D. /bin

Explanation:

4. Where on a Linux system would you find the shadow password file?

A. /bin

B. /var

C. /etc

D. /root :

Explanation:

5. You are experiencing issues on your Linux system and need to access logs for troubleshooting purposes. Where are the files located?

A. /usr

B. /root

C. /var

D. /log

Answer:

Explanation:

Explanation / Answer

1.
   Ans: B. fstab
   The /etc/fstab file can be used to define how disk partitions, various other block devices, or remote filesystems should be mounted into the filesystem.
  
   Each line in the /etc/fstab file contains the following fields separated by spaces or tabs:
       file_system dir type options dump pass
      
   file system
       The partition or storage device to be mounted.
   dir
       The mountpoint where <file system> is mounted to.
   type
       The file system type of the partition or storage device to be mounted. Many different file systems are supported: ext2, ext3, ext4, btrfs, reiserfs, xfs, jfs, smbfs, iso9660, vfat, ntfs, swap and auto. The auto type lets the mount command guess what type of file system is used. This is useful for optical media (CD/DVD).
   options
       Mount options of the filesystem to be used. See the mount man page. Please note that some options are specific to filesystems; to discover them see below in the aforementioned mount man page.
   dump
       Used by the dump utility to decide when to make a backup. Dump checks the entry and uses the number to decide if a file system should be backed up. Possible entries are 0 and 1. If 0, dump will ignore the file system; if 1, dump will make a backup. Most users will not have dump installed, so they should put 0 for the dump entry.
   pass
       Used by fsck to decide which order filesystems are to be checked. Possible entries are 0, 1 and 2. The root file system should have the highest priority 1 (unless its type is btrfs, in which case this field should be 0) - all other file systems you want to have checked should have a 2. File systems with a value 0 will not be checked by the fsck utility.
      
2.
   A. wipe
   wipe - securely erase files from magnetic media
   Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent to recover the last two or three layers of data written to disk; wipe repeatedly overwrites special patterns to the files to be destroyed
  
3.  
   D. /bin
  
   /bin – User Binaries

       Contains binary executables.
       Common linux commands you need to use in single-user modes are located under this directory.
       Commands used by all the users of the system are located here.
       For example: ps, ls, ping, grep, cp.
      
4.
   C. /etc
  
   In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system. Ordinarily, user information, including passwords, is kept in a system file called /etc/passwd .
  
5.
   C. /var
  
   /var:
  
Contains variable data like system logging files, mail and printer spool directories, and transient and temporary files. Some portions of /var are not shareable between different systems. For instance, /var/log, /var/lock, and /var/run. Other portions may be shared, notably /var/mail, /var/cache/man, /var/cache/fonts, and /var/spool/news.