Preview

ISS 418 Lab 7 and 8

Powerful Essays
Open Document
Open Document
1105 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISS 418 Lab 7 and 8
Lab Assessment Questions & Answers

1. What is the command to view the current Linux Kernel parameters?
The command that will allow you to see the Kernel parameters is sysctl –a.
2. What command can you run to list all the kernels available parameters one screen at a time with the ability to move forward and backwards on the output?
The command that would you to do accomplish this would be the less /proc/modules

3. What is the purpose of enabling syncookies in the Linux Kernel?
The purpose of enabling syncookies in the Linux Kernel is to help prevent a type of DoS attack by dropping connection which can lead to additional SYN messages.
4. When you want to enable a Linux Kernel command and enable it immediately without a physical re-boot of the system, what command must you enable in front of the command parameter? Explain what the following command will do : echo “1” > /proc/sys/net/ipv4/ip_forward
The command would enable the kernel along with activating IPv4 forwarding. The system requires a value of either 1 or a 0 with 1 being on and 0 being off. So the command would write the number 1 in the file to activate it. 5. If you wanted to limit the number of files that a user can open simultaneously on the Fedora Core Linux Server to a maximum of 1, what is the command syntax you need to enable in the Linux Kernel?
The command to to limit the number of files that a user can open simultaneously is the sysctl -w fs.file-max=1 command.

6. What is the best way to make a system-wide permanent change to the kernel to enable syncookies?
To do this you would enable on the TCP protocol by editing the following /etc/sysctl.conf file and add the following line: net.ipv4.tcp_syncookies = 1

7. Given a system that has been freshly installed your boss wants you to make sure it is up to date and locked down at the Kernel level. What steps would you take to verify what modules are loaded into the Kernel and how would you go about locking them down?
The

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such as Windows or Mac OS X. In addition, application developers want to ensure that the platform as a whole does not diverge. Even if an application works on today's distributions, will it work on tomorrow's? The LSB workgroup has, as its core goal, to address these two concerns. We publish a standard that describes the minimum set of APIs a distribution must support, in consultation with the major distribution vendors. We also provide tests and tools which measure support for the standard, and enable…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 7 Gdp

    • 311 Words
    • 2 Pages

    There are a few problems I would anticipate with using this combination of protocols. The first is if there is some sort of failure with the delivery of the sequence of data packets. As UDP is connectionless there isn’t a reliable order that the packets will arrive, one would assume this is why they are using stop and wait, to try and compensate for this issue. As a result, you may get some packets timing out and being resent by the server causing duplicate packets to be sent, all while awaiting ACK arrival even though there may not have actually been any failure. Then there are extra packets on the network trying to arrive while this is occurring. These duplicate packets, or duplicate ACKs, need to be handled in order to keep the file transfer from becoming exponentially larger each time there was some sort of issue.…

    • 311 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    Use the ifconfig command to verify your IP Address and Subnet Mask. Make a note of the interface (eth0 or eth1). Use the route command to determine the Default Gateway. Record this information in the table below:…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    to the kernel and how important aspects can be modified on the fly at anytime during the bootup process because it…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    With multiple processors executing the same or different parts of the kernel, kernel tables and management structures must be managed properly to avoid data corruption or invalid operations.…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for accepting incoming HTTP client connections and for delivering data packets to clients that are streaming by using HTTP.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    xxasdff

    • 546 Words
    • 3 Pages

    It passes the tasks information from one to another, without damaging or corrupting the information. These are necessary in a preemptive scheduler of many tasks, because without them the tasks might communicate with corrupted information or otherwise interfere with each other. It uses…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Linux vs Windows vs Mac

    • 1355 Words
    • 6 Pages

    Operating systems are the link between the user and the applications and the hardware. They are responsible for deciding how the user commands will be interpreted and how the operating system itself will carry the process. There are several different types of operating and each carries out processing in their own way. Windows, UNIX/Linux and Mac are some of the most popular and widely used operating systems.…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    The significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol is to ensure a connection is made before transmitting data such as SSH and HTTP. FTP, Telnet, HTTP, HTTPS, SMTP, POP3, IMAP, SSH use TCP as a transport protocol.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Transmission Control Protocol (TCP) is the utmost universally protocol that is used on the Internet. The cause on behalf of this is that TCP gives fault rectification. An assurance of conveyance is tantamount with TCP. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data, “called packets” that a message is divided into four efficient routing through the Internet. This is accredited fundamentally in reference to a process termed “flow control.”…

    • 967 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    RHCE

    • 622 Words
    • 3 Pages

    To attain an RHCT certification, you are required to complete two Red Hat Courses namely: RH 033 and RH 133.…

    • 622 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Synchronization

    • 1936 Words
    • 8 Pages

    The synchronization problem is the problem of finding a protocol that makes the network synchronized. We consider dynamic protocols of the form ˙ wi = Awi + BF…

    • 1936 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Silberschatz, A., Galvin, P. B., & Gagne, G. (2013). Operating System Concepts Essentials (2nd ed.). Hoboken, NJ: John Wiley & Sons,…

    • 900 Words
    • 3 Pages
    Better Essays

Related Topics