Lab: Rootly Powers
Step 5: Follow Up
- To do this step:
- You should have performed the first four steps in this lab.
- In this section please create a word document containing the answers to the following portions.
- Include the item number and sub-number with your answers.
- Include full answers/descriptions. Do not be a minimalist.
- When ask, or when it supports your answer, include a screen shot. Make sure you explain how your screen shot demonstrates/supports your answer.
- List the three "special" things root can do on a *nix system.
- List two tools that allow a user to determine "who" they are on a *nix system.
- List three tools that allow you to look at a file on a *nix system. Describe what each does.
- List two tools that allow you to look at the processes running on a *nix system.
- Investigate sudo
- Can Alice use the sudo command? What happens when she attempts to do so? Show a screen shot as part of your answer.
- John is Bob's "friend" and attempts to convince him to add his account(john) to the sudoers group. He asks Bob to add john to the sudo line in /etc/group.
- Can John edit the /etc/group file himself? Why or why not? Provide a screen shot to support your answer.
- Can John use sudo? Provide a screen shot in to support your answer in your document.
- As root, edit /etc/group using one of the following (vi, nano, joe)
- Change the line
- Simply add
- The line should be
- Can John use sudo now? Provide a screen shot to support your answer in your document.
- Discuss the implications of a person with sudo privileges changing system configurations without a knowledge of what they are doing.
- Alice has discovered Bob's password.
- Discuss the implications.
- Why is it especially important that a person with sudo privileges maintains a secure password.
Type your answers in a word document.
Submit the assignment to the D2L folder Lab1 by the assigned date.