Review Questions
The answers to these review questions are in Appendix A.
1. After configuring the PolicyKit rules for your system, what command would you use to use those rules when executing a target command that your current user doesn’t have rights to execute alone?
sudo
pkexec
suexec
execit
2. When configuring the sudo command, what is the full path and filename of its primary configuration file?
____________
3. You are able to access a remote system using just a passphrase for authentication. What must you have copied from your system to the remote system in order for this to happen?
Your personal public key
The system’s public key
The wheel group’s public key
The remote user’s private key
4. When configuring your system to allow or deny certain groups or users to sign in via SSH, what is the full path and filename of the configuration file where these settings are kept?
____________
5. If you invoke the ssh command with the -X option, what are you likely to be doing after you sign on to the remote system?
Just standard commands
Running xeyes locally and displaying remotely
Running X11 on the remote system and displaying locally
Running remote X apps that display locally
6. Which of the following commands is specifically designed to make it more secure to edit files when using sudo to elevate your privileges?
sudovim
visudo
sudoedit
nanobot