Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Answer based on Linux. Q7. What can symbolic links do that hard links cannot do?

ID: 3780614 • Letter: A

Question

Answer based on Linux.

Q7. What can symbolic links do that hard links cannot do?

Select one:

a. Use different names for the link and the linked-to file

b. Link files on two different filesystems

c. Enforce identical permissions on the link and the original file

d. Provide easy access from GUI file managers

Q8. You want to find all files on your server that have either the SGID or SUID permission set. Which command should you use to obtain a list of these files?

Select one:

a.find / -perm +6000 -type f

b. find / -perm +4000 -type f

c.find / -perm +2000 -type f

d.find / -perm +1000 -type f

Q9. What does the following command accomplish?

# chown one:two three

Select one:

a. It assigns ownership of the file three to the user one and the group two

b.It assigns ownership of the file one to the owner two and the group three.

c. It assigns ownership of the file two to the owner one and the group three

d.It assigns ownership of the file one to the owner three and the group two.

Q10. What is the effect of typing cp -Rpf ./sample ~/ as an ordinary user? (Choose all that apply.)

Select one or more:

a.The sample file or directory is copied from the current directory to the user’s home directory.

b.The copy operation halts at filesystem boundaries; if a filesystem is mounted somewhere under sample, it won’t be copied.

c. Permissions and time stamps on the copied files are preserved.

d.If the target directory holds files of the specified names, they’re overwritten without prompting.

Explanation / Answer

Q7. What can symbolic links do that hard links cannot do?

b. Link files on two different filesystems

Symbolic link can work on different file systems where as hard link knows nothing about where the data is stored and other file system hence it doesnt. Hence theya re valid within the same file subsystems.

Q8. You want to find all files on your server that have either the SGID or SUID permission set. Which command should you use to obtain a list of these files?

Select one: a is the answer

a.find / -perm +6000 -type f [Find SUID or SGID files ]

b. find / -perm +4000 -type f [Find only SUID files ]
find / -perm +2000 -type f [Find only SGID files ]



Q9. What does the following command accomplish?

# chown one:two three

The syntax of chown command is chown user:group file which means , It assigns ownership of the file to the user and the group .
For us # chown one:two three , group is two, file is three and user is one.


So , a. It assigns ownership of the file three to the user one and the group two [Answer]

Q10. What is the effect of typing cp -Rpf ./sample ~/ as an ordinary user? (Choose all that apply.)

Select one or more: a and c

a.The sample file or directory is copied from the current directory to the user’s home directory. [True by seeing the command]

b.The copy operation halts at filesystem boundaries; if a filesystem is mounted somewhere under sample, it won’t be copied. [False, Dont think so it will halt ]

c. Permissions and time stamps on the copied files are preserved. [True, because of -p option]

d.If the target directory holds files of the specified names, they’re overwritten without prompting. [False , even the use of -f will require confirmation ]



Thanks, Let me know if there is any concern.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote