Unix Andministration -- The Xena Version

  1. (Yes/No) Is your name on the test?
  2. What command would you type to see every line NOT containing a 'Gabi' in the file /etc/superheros, all in REVERSE alphabetic order?
    ___________________________________________________________________________
  3. I just made a subdirectory tree '/home/Hercules'.  I want to set the files such that the user 'hercules' owns all the files and subdirectories in the tree.  I also want to set the permissions such that hercules can read and write his own files, and no one else can access them.  What commands should I type?
    ___________________________________________________________________________
    ___________________________________________________________________________
  4. How many files on euclid in '/bin' and '/usr/bin' have at least two 'e' in the name? _________
  5. How much RAM does euclid have? _________________________
  6. What user and group owns /var/spool/lpd/lp on euclid?
    USER: _____________________ GROUP: _______________________
  7. Where is the very first piece of code the CPU runs on startup stored?  How would you change it?
    ____________________________________________________________________________
    ____________________________________________________________________________
  8. On euclid, what startup scripts run at level three that do not run at level five?
    ____________________________________________________________________________
    ____________________________________________________________________________
  9. I want to change the computer so that it prints 'Gabi Rules' every time someone presses CTL_ALT_DEL, instead of rebooting.  How would I do this? (Yes, this really can easily be done.)
    ____________________________________________________________________________
    ____________________________________________________________________________
  10. What must I do to change euclid such that it waits at the lilo prompt for 10 seconds before booting into Linux?
    ____________________________________________________________________________
    ____________________________________________________________________________
  11. Suppose you compile into the kernel the "Xena Sword Swinging Device Driver", yet you do not have a robot arm holding a sword on your computer.  What effects will you see?
    GOOD: ______________________________________________________________________
    BAD: ________________________________________________________________________
  12. Suppose you have networking all set up right, but you have installed an incorrect gateway.  What will happen?
    _____________________________________________________________________________
    _____________________________________________________________________________
  13. What is the network latency between euclid and www.xena.com? _________________________
  14. Approximately how many packets per day has euclid sent in the last two weeks?  (Show work.)
    _____________________________________________________________________________
  15. There are at least four copies of the program 'mingetty' running on euclid, regardless of the runlevel.  Whenever I kill one they restart.  Your computer is very likely set up the same way.  What is starting them?
    _____________________________________________________________________________
  16. (Local/Euclid) Suppose there is a user 'calisto' in your /etc/passwd file, and one in the YP server euclid.  Which entry takes precedence?
  17. Aphrodite is accessing files while logged onto your computer, but the files are NFS mounted from euclid.  Euclid crashes, but comes back up ten mintes later.  What effect does Aphrodite see?
    _____________________________________________________________________________
  18. I have root access to gaag, but I want to break into bine.  I don't have root access to bine, nor bine's YP server.  However, I do know that all these computers are on the same eithernet, and that the network allows me to see traffic moving between any two computers on the network.  How can I break in?
    _____________________________________________________________________________
    _____________________________________________________________________________
  19. Linux assignes process ID numbers starting from one, and going up one each time a new process is created.  How many processes are created on a reboot of your machine?  Please count even short lived processes. _____________________
  20. Aki is already set up as a YP client for password and group information.  I want to change aki's setup so that only password and not group info comes from YP.  How can I do this?
    ______________________________________________________________________________
    ______________________________________________________________________________
  21. You are logged in over the network to euclid, and someone cuts your network cable.  It takes you over 30 seconds to reconnect.  What happens to your remote session? 
    ______________________________________________________________________________
  22. Bine is an YP client of euclid's.  Bine mounts its files via NFS from euclid.  Bine is on the same ethernet as euclid.  You want to read 'Aries' files.  You don't have root on euclid.  You do have root on bine.  What can you do?
    ______________________________________________________________________________
    ______________________________________________________________________________
  23. How can root on euclid stop you?
    ______________________________________________________________________________
    ______________________________________________________________________________