in Education by
Using the ______ account of a UNIX system, one can carry out administrative functions. (a) root (b) administrative (c) user (d) client The question was posed to me in examination. Asked question is from Linux OS and its Security topic in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (a) root Easiest explanation: Using the root account of a UNIX system, one can carry out administrative functions in the system. Rest of the accounts in the system are unprivileged, i.e. other accounts have no rights beyond accessing of files having proper permission.

Related questions

0 votes
0 votes
    Increase your security for social media account by always ____________ as you step away from the system. (a ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Some Trojans carry ransomware with them to encrypt the data and ask for ransom. (a) True (b) False ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ (a) Cyber-crime ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______________ programs are specially designed for stealing your account data for online banking systems, e-payment ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is a proper measure of securing social networking account? (a) Never keep your password with ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Many social media sites and services provide _______________ for legitimate account verification. (a) Retina ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Trojan-Spy programs can keep an eye on how you are using your system. (a) True (b) False This ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...