Information Technology Reference
In-Depth Information
Answer A is correct. Answer B is the definition of an authorization; therefore,
answer B is incorrect. Answer C is the definition of a profile and incorrect.
Roles, like other user accounts, require a password but can only be accessed
using the
su(1)
command. Therefore, answers D and E are incorrect.
Question 7
What is the command used to view the ACLs associated with a file?
The correct answer is
getfacl
.
Question 8
Which of the following keys can be used in the
attribute
field of the RBAC exe-
cution attributes database file? [Select all that apply.]
❑
A.
auths
❑
B.
gid
❑
C.
help
❑
D.
profiles
❑
E.
uid
Answers B and E are correct. The only valid keys for the attribute field of the
execution attributes database file are
egid
,
gid
,
euid
, and
uid
. The
auths
key
can only be specified in the user and profile attributes database files.
Therefore, answer A is incorrect. The
help
key is only supported in the
authorization and profile attributes database files making answer C incorrect.
The
profiles
key can only be specified in the user attributes database file.
Therefore, answer D is incorrect.
Question 9
Which of the following describes the format of the RBAC user attributes data-
base file?
❍
A.
name:qualifier:res1:res2:attributes
❍
B.
name:res1:res2:description:attributes
❍
C.
name:res1:res2:short description:long description:attributes
❍
D.
name:policy:type:res1:res2:ID:attributes