Test Questions & Answers File Permissions Ch.9 - Answer Key + Test Bank | Linux Essentials 1e Rothwell by William Rothwell. DOCX document preview.

Test Questions & Answers File Permissions Ch.9

Linux Essentials for Cybersecurity (Rothwell/Kinsey)

Chapter 9 File Permissions

1) Which of the following commands is used to view the permissions of a file or directory?

A) ls -l

B) cd

C) chmod

D) umask

2) When setting file permissions, which of the following permissions means users can modify the file contents?

A) Read

B) Write

C) Execute

D) All of the above

3) When setting directory permissions, which of the following permissions means users are limited to listing files in the directory?

A) Read

B) Write

C) Execute

D) None of the above

4) Which of the following commands is used to change permissions on files?

A) umask

B) ls

C) cd

D) chmod

5) Which of the following commands is used to specify which default permissions to exclude when creating a new file or directory?

A) chmod

B) cd

C) umask

D) ls

6) The rw-r--r-- file corresponds to which of the following umask values?

A) 002

B) 022

C) 027

D) 077

7) In reference to special permission sets, SUID is short for which of the following?

A) Specify User ID

B) Set Umask ID

C) Set User ID

D) Specify Umask ID

8) Which of the following permissions can be used to execute a command that has access to files and directories using the group ownership of the command?

A) SGID

B) Octal

C) Symbolic

D) SUID

9) Which of the following permissions changes the behavior of the write permission when applied to a directory?

A) SUID

B) Sticky bit

C) SGID

D) Execute

10) Which of the following commands can be used to set the sticky bit permission?

A) chmod o+t file

B) chmod g+s file

C) chmod u+s file

D) chmod o-t file

11) Which of the following is the best solution for allowing the owner of a file to give permissions for specific users and groups?

A) SGID

B) Sticky bit

C) SUID

D) Access control lists (ACLs)

12) Which of the following commands is used to create an ACL on a file or directory?

A) getfacl

B) chmod

C) setfacl

D) mkdir

13) Which of the following is the format of the argument to the -m option for the setfacl command?

A) what:who:permission

B) who:permission:what

C) permission:what:who

D) None of the above

14) Which of the following specifies the maximum permissions that anyone besides the user owner and “others” have on the file?

A) umask value

B) mask value

C) mkdir

D) getfacl

15) Which of the following commands is used to change either the user owner or group owner of a file or directory?

A) chown

B) chgrp

C) setfacl

D) chattr

16) Which of the following commands is designed to change the group ownership of a file?

A) chown

B) chgrp

C) setfacl

D) chattr

17) A(n) __________ file is completely unchangeable; it cannot be deleted or modified by anyone, including the root user.

A) absolute

B) reversible

C) irreversible

D) immutable

18) Which option for the chattr command is used to recursively apply changes to an entire directory structure?

A) -r

B) -V

C) -R

D) -v

19) SELinux refers to which of the following?

A) Security Enabled Linux

B) Security Enhanced Linux

C) System Enhanced Linux

D) System Enabled Linux

20) Which of the following commands can be used to determine if SELinux is available (and actively being used) on a system?

A) getenforce

B) restorecon

C) setenforce

D) semanage

Document Information

Document Type:
DOCX
Chapter Number:
9
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 9 File Permissions
Author:
William Rothwell

Connected Book

Answer Key + Test Bank | Linux Essentials 1e Rothwell

By William Rothwell

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party