Information Technology Reference
In-Depth Information
Answer A is correct. Answer B is the definition of an authorization; therefore,
answer B is incorrect. Answer C is the definition of a profile and incorrect.
Roles, like other user accounts, require a password but can only be accessed
using the su(1) command. Therefore, answers D and E are incorrect.
Question 7
What is the command used to view the ACLs associated with a file?
The correct answer is getfacl .
Question 8
Which of the following keys can be used in the attribute field of the RBAC exe-
cution attributes database file? [Select all that apply.]
A.
auths
B.
gid
C.
help
D.
profiles
E.
uid
Answers B and E are correct. The only valid keys for the attribute field of the
execution attributes database file are egid , gid , euid , and uid . The auths key
can only be specified in the user and profile attributes database files.
Therefore, answer A is incorrect. The help key is only supported in the
authorization and profile attributes database files making answer C incorrect.
The profiles key can only be specified in the user attributes database file.
Therefore, answer D is incorrect.
Question 9
Which of the following describes the format of the RBAC user attributes data-
base file?
A.
name:qualifier:res1:res2:attributes
B.
name:res1:res2:description:attributes
C.
name:res1:res2:short description:long description:attributes
D.
name:policy:type:res1:res2:ID:attributes
Search WWH ::




Custom Search