Preview

Lab 5 Assessment Worksheet

Satisfactory Essays
Open Document
Open Document
316 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 5 Assessment Worksheet
Lab #5 – Assessment Worksheet
Apply Hardened Security for Linux Services & Applications
1. When configuring services, what Linux directory typically contains server configuration files?
/etc
2. What command disables remote access to the MySQL Database? Is this a security hardening best practice?
Bind-address=YOUR-SERVER-IP, If you don 't need remote access, then binding should be considered a best practice.
3. What is a Linux runlevel for a specific service of application? What command allows you to define the runlevel uniquely for a service or application?
0 - System halt; no activity, the system can be safely powered down. 1 - Single user. 2 - Multiple users, no NFS (network filesystem). 3 - Multiple users, command line interface; the standard runlevel for most Linux-based server hardware. 4 - User-definable. 5 - Multiple users, GUI. 6 – Reboot. telinit
4. What is the Apache Web Server? Review the /etc/httpd/conf/httpd.conf configuration file, and point out a setting that could enhance security.
Web server application noted in its help creating the World Wide Web, ResourceConfig /dev/null
5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use of telnet is discouraged.
Associated messages including passwords are sent in cleat text so if a hacker is using a packet sniffer then he now has access to any usernames or passwords.
6. What are Symbolic links?
A special type of file that contains a reference to another file or directory in the form of an absolute or relative path
7. Why is it recommended to disable Symbolic Links in MySQL?
To prevent various security risks
8. Why would you add the ‘skip-networking’ command?
To prevent remote access and to disallow access to load a local file.
9. What two files does sendmail create while processing a message?
File: "df": This stores the body of the message. File: "qf": This stores the headers and other information.
10. What command can you use locally to find the sendmail’s version number?



Links: in MySQL? To prevent various security risks 8. Why would you add the ‘skip-networking’ command? To prevent remote access and to disallow access to load a local file. 9. What two files does sendmail create while processing a message? File: "df": This stores the body of the message. File: "qf": This stores the headers and other information. 10. What command can you use locally to find the sendmail’s version number? sendmail -d0.4 -bv root

You May Also Find These Documents Helpful

  • Powerful Essays

    Chapters 1-4

    • 1910 Words
    • 8 Pages

    6. The Windows shell operates in _____ mode and the kernel operates in _____ mode.…

    • 1910 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    7. What is a shell? How does it work with the kernel? With the user?…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Assignment1

    • 354 Words
    • 5 Pages

    Use the table in the data file below to answer these questions regarding file structure:…

    • 354 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    NT1430 Linux Networking

    • 1121 Words
    • 5 Pages

    • grep is a program that searches for a string within a directory or command output…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    operating system

    • 1174 Words
    • 5 Pages

    Kernel-level thread; this is a type of threading in which all of the work of thread management is done by the kernel.…

    • 1174 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Linux Interview Questions

    • 10428 Words
    • 42 Pages

    1. How do you take a single line of input from the user in a shell script?…

    • 10428 Words
    • 42 Pages
    Powerful Essays
  • Good Essays

    10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access - list command. What sequence number does the new entry have?…

    • 2217 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Osi References

    • 962 Words
    • 4 Pages

    This layer is mostly concerned with data format. It converts the data between different formats so that both the sender and the receiver can use heterogeneous data. For example, mail messages contain various data formats: text, application attachments, video, audio, and graphical signature.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ms Dos

    • 896 Words
    • 4 Pages

    3. These commands can be used as long as DOS is running on the system.…

    • 896 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    SDLC

    • 538 Words
    • 3 Pages

    - 2. Look-up files. Contain static or reference information to validate information entered into the system is correct.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mbn,b,m

    • 272 Words
    • 2 Pages

    10. Make sure parameter file “P_MessageName” has equal number of unique data (MESSAGE_001 ……..MESSAGE_XXX) as processed (Input message count).…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    lemme

    • 3472 Words
    • 14 Pages

    SMTP is used as the common mechanism for transporting electronic mail among different hosts within the transmission control protocol/Internet protocol (TCP/IP) suite. It is an application layer protocol. Under SMTP, a client SMTP process opens a TCP connection to a server SMTP process on a remote host and attempts to send mail across the connection. The server SMTP listens for a TCP connection on a specific port (25), and the client SMTP process initiates a connection on that port (Cisco SMTP, 2005). When the TCP connection is successful, the two processes execute a simple request–response dialogue, defined by the SMTP protocol (see RFC 821 for details), in which the client process transmits the mail addresses of the originator and the recipient(s) for a message. When the server process accepts…

    • 3472 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    A file descriptor(or file header includes information that describes the file, such as the field names and their data types , and the addresses of the file blocks on disk. Records are stored on disk blocks. The blocking factor bfr or a file is the (average) number of file records stored in a disk block. A file can have fixed-length records or variable-length records.…

    • 1369 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Mcom

    • 2851 Words
    • 12 Pages

    large number and wide range of messages at their disposal that they can choose to send.…

    • 2851 Words
    • 12 Pages
    Better Essays