This action might not be possible to undo. Are you sure you want to continue?
Systems Administration 1
School: Programme Title:
Maths and Computing Bachelor of Science in Computing - Award Higher Certificate in Science in Computing in Information Technology Support – Year 2
External Examiner(s): Internal Examiner(s):
Mr. James Greenslade Mr. Gerard McSweeney
Answer 4 questions All questions are worth equal marks 2 hours Winter 2008
Requirements for this examination:
Note to Candidates: Please check the Programme Title and the Module Title to ensure that you have received the correct examination paper. If in doubt please contact an Invigilator.
(a) (b) (c) (d) (e) (f) Explain how a user is authenticated when logging onto Linux.1. (1 Mark) Apart from ordinary files. would you expect to find configuration files? (2 Marks) In a Linux environment. KDE is a well known Linux GUI. (2 Marks) 2. What problem would the user have when she logs on and how would the administrator solve it? (3 Marks) (2 Marks) (g) An administrator has created two new Linux users bill and jack. (2 Marks) Why is it dangerous to use a simple word for a password? (2 Marks) What sort of information is held about users in the /etc/passwd file? (7 Marks) Without using a GUI. The administrator wants to: • • Enable bill to be able to copy files from jack’s home directory Enable jack to copy files to bill’s home directory (5 Marks) Explain how this could be achieved. Write down four advantages of using UNIX. directory and soft links. (a) (b) (c) (d) (e) (f) (g) (h) Write down ten system administration tasks. (10 Marks) (4 Marks) (2 Marks) (2 Marks) (2 Marks) In which Linux directory. where might you expect to find root’s home directory. Write down two disadvantages of using UNIX. 2 . write down two other types of Linux files. (4 Marks) Give two reasons why Linux passwords are regarded as being secure. What is a Linux distribution? Write down an example. Name another. how could you check group membership? The command useradd kate creates a new user kate.
(a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) Explain what is meant by a hard link. (4 Marks) How might an administrator set all users’ PATH (not including root’s). What is meant by an orphan link? What is meant by a user’s PATH? (2 Marks) (1 Mark) (3 Marks) (2 Marks) (2 Marks) Describe two ways a user may change his/her PATH in a Linux environment.3. The backup should be placed on a USB directory mounted at /media/usb. (5 Marks) A user wishes to backup the entire contents of his home directory. (a) (b) Suggest five criteria an administrator should consider when planning a backup policy. (5 Marks) 3 . (2 Marks) How might an administrator set root’s PATH? (2 Marks) PATH and HOME are environmental variables. (5 Marks) Write a script to retrieve the backup in (b) above. (3 Marks) 4. Write a shell script which could do this. Name two other environmental variables. How many hard links would a file normally have? Explain how a soft link is different from a hard link. Describe how the script could be changed to: Ensure no two backups have the same name Backups can only be seen and read by their owner (5 Marks) Write down five items of information an i-node (information node) might hold about a file. (5 Marks) (c) (d) • • (e) Other users want to use the script in (c) above. (2 Marks) How would a user list all his/her environmental variables? (2 Marks) Describe how a user might create a new environmental variable and give an example of how it might be used.
(7 Marks) With reference to Intel hard disks.5. the UNIX block addressing scheme. explain the difference between primary. (4 Marks) What is meant by a swap partition? What is meant by mounting a device? (2 Marks) (2 Marks) Explain how you would make a removable device read only. (2 Marks) What is the standard Linux file system? (2 Marks) 4 . (6 Marks) Give reasons why a personal computer might have more than one partition. with the aid of a diagram. extended and logical partitions. (a) (b) (c) (d) (e) (f) (g) Describe.