Include chapter and page references with each answer.

3. How would you run a program with Sam’s privileges if you did not know his password but had permission to use sudo to run a command with root privileges? How would you spawn a shell with the same environment that sam has when he first logs in?

5. How do you kill process 1648? How do you kill all processes running kmail? In which instances do you need to work with root privileges?

7. Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember.

1. What is the function of the /etc/host file? Which service can you use in place of, or to supplement, the host file?

3. What is an inode? What happens to the inode when you move a file within a filesystem?

5. What is a device file? Where are device files located?

7. Write a line for the /etc/fstab file that mounts the /dev/hdb1 ext4 filesystem on /extra with the following characteristics: The filesystem will not be mounted automatically when the system boots, and anyone can mount and unmount the filesystem

1. Which commands can you use from the command line to send a file to the default printer?

3. Which commands list your outstanding print jobs?

5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol?

1. How would you list all the processes running vi?

3. From the command line, how would you create a user named John Doe who has the username jd and who belongs to group 65535?

5. Give a command that creates a level 0 dump of the /usr filesystem on the first tape device on the system. Which command would you use to take advantage of a drive that support compression? Which command would place a level 3 dump of the /var filesystem immediately after the level 0 dump on the tape?

9. Create a crontab file that will regularly perform the following backup:

a.perform a level 0 backup once per month.

b.perform a level 2 dump one day per week.

c.perform a level 5 dump every day on which neither a level 0 nor a level 2 dump is performed.

In the worst –case scenario, how many restore commands would you have to give to recover a file that was dumped using this schedule?

Include chapter and page references with each answer.