Nt1430 Unit 5 Homework

In: Computers and Technology

Submitted By gsbahler
Words 584
Pages 3
Chap 18 Pg 699
Q1 difference between scp and sftp utilities?
SCP is a secure file copy utility and SFTP is a secure file transfer protocol even though it does not have anything to do with the FTP we are use to in windows.
Q2 How can you use SSH to find out who is logged in on a remote system?
By typing $ ssh host who in the terminal window
Q3 How would you use scp to copy ~/.bashrc file from the system named plum to the local system?
From the local system you would type scp user@plum:~/..bashrc local system: .bashrc.
Q4 How would you use scp to run xterm on plum and show the display on the local system?
Having the same username on both systems and the X11 server running locally, the command to run xterm from the plum system and show on the local display is $ ssh plum xterm
Q5 What problem can enabling compression present when you are using ssh to run remote X applications on a local display?
Compression can cause an increase in latency to an extent the might not be desirable for an X session forwarded over high-band width connections.
Q6 When you try to connect to another system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened? What should you do?
This indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check to find out if something changed. If everything is ok, get rid of the remote system’s key from the file located in the error message and try logging in on the remote system using ssh.

Chap 20 pg 757
Q1 By default, email addressed to system goes to root. How would you also save a copy in /var/logs/systemmail?
Edit the /etc/aliases that states: system: root, /var/logs/systemmail Q2 How would max store a copy of his email in ~/mbox and sens a copy to Max@example.com?
$cat ~ Max/ .forward ~/mbox max@bravo.com \max…...

Similar Documents

It-320 Unit 5 Homework

...Chapter 5 Review page 136 1., The OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes. Although it doesn’t seem to perform anything. 3. Just like anything else that is organized, if they are organized they will be easier to remember, to work with and to manage. 5. The Presentation layer is the 6th.The reside under the presentation layer-JPEG, MPEG & MIDI. Layer helps for the display. 7. Transport layer functions that reside are TCP, UDP-RTP & NCP. At the Transport layer, TCP takes the segment de-fined by layer 5 amd adds a header containing the port number, error checking schemes, flow contorl checks and sequence numbers. 9. Data Link layer functions that reside are Ethernet, Frame Relay, ATM & HDLC. To my understanding is the connectivity protocols for the OS. 11. To set up a routing protocol between five network routers you would be working under layers and would use information from 4, 3, 2 &1. But mostly 3. 13. TCP and UDP reside under layer 4 the Transport layer…… D. Part of the transport layer responsible for end to end transmission of information. 14. Layer 4 Transport, protocols- TCP, UDP-RDP & NCP. 15. Layer 3 Network, protocols- IP, IPX & AppleTalk. 16. Layer 2 Data Link, protocols- Ethernet, Frame relay, ATM & HDLC. 17. Layer 1 Physical, protocols- TDM, SONET, ADSL, 2B1Q, RS-232, RJ-45 & RJ-11. 18. The data link......

Words: 355 - Pages: 2

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Unit 1 Nt1430

...Juan Pena NT1430 Unit 1 Chapter Exercises Ch.1 1. Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 4. GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands of people helped refine the operating system online. Ch.2 1. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Ch.3 1. Live System- A computer that runs the Wide Area Progressive games and displays the main system window. The advantages are customization, cost, free market, stability, and community. 4. Put/boot at the beginning of the drive (partition 1) so that Linux does not have to boot from a partition too far into the drive. Positioning of /boot can be a problem on......

Words: 351 - Pages: 2

Nt1430 Homework 1

...operating system known as “Linux” aka “GNU/Linux”. Thousands of people helped refine the operating system online. Chapter 2 Exercise 1 1. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Chapter 3 Exercises 1, 4, 8 1. Live System- A computer that runs the Wide Area Progressive games and displays the main system window. Advantages- Customization, cost, free market, stability, and community. 4. Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8. When the system enters runlevel 5 Chapter 11 Exercises 1, 3, 7 1. When a system is in single-user mode, you can log in only at the console. Not all of the filesystems are mounted, and many daemons are not running. With the system in multiuser mode you can log in at any terminal or workstation that is set up for login, most or all of the filesystems are mounted, and all of the daemons that your system is set up to run are running. 3 The letters stand for substitute user. You can give yourself privileges of any user whose password you know (or any user when you are running as root). You can also execute a command (other than a shell) as the specified user. 7 A good strong password to have would be something that you’ve always known that nobody else knows....

Words: 374 - Pages: 2

Nt1430 Unit 1 Excercises

...Unit 1 Exercises Chapter 1. 1. Free software is user can uses software at no charge. The characteristics of free software are no cost, full version, no expiration. 4. Free software Foundation/GNU is free to redistribute, modify, and study it. Linux is operating system developed through the cooperation of numerous people around the world, is product of the internet and is a free operating system. Linux provides UNIX and GNU. Linus Torvalds helps refine Linux system. Chapter 2. 1. The process installing Fedora/RHEL: a. Make sure the BIOS is set to boot from DVD drive. b. Check installation medium. c. Creates RAM disk uses in place of the hard disk. d. Configure system. e. Writes the operating system files to the hard disk. f. Completing installation on boot up. g. Ready to use. Chapter 3. 1. Live system can run on computer without installing Linux on the computer. Live system does not require installation and hard drive. 4. The /boot partition should be on first partition on hard drive. 8. Fedora system start X by default when enters runlevel 5 (graphical environment). Chapter 11. 1. Single-user mode has only the system console is enabled. Multi-user mode has all appropriate file systems are mounted, users can log in from all connected terminals, dial-up lines, and network connections. 3 The su command, also referred to as substitute user, super user, or switch user, allows a computer operator to change the current user account associated with the......

Words: 328 - Pages: 2

Nt1430 Unit 2 Discuss

...The Second Extended File System (EXT2) file system is a replacement of the Extended File System (EXT). The file system was created by Rémy Card in 1993. EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The Filesystem Hierarchy Standard (FHS) is a reference describing the conventions used for the layout of a UNIX system. It has been made popular by its use in Linux distributions, but it is used by other UNIX variants as well. The Linux Standard Base (LSB) refers to it as a standard. In the FHS all files and directories appear under the root directory "/", even if they are stored on different physical or virtual devices. Note however that some of these directories may or may not be present on a Unix system depending on whether certain subsystems, such as the X Window System, are installed. The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux......

Words: 421 - Pages: 2

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Nt1430 Unit 19

...Unit 19 Chapter Exercises Exercises Chapter 24 1. What kind of server responds to recursive queries? How does this server work? A DNS servers that is setup with to preform recursive queries or an SQL server 2. What kind of DNS record is likely to be returned when a Web browser tries to resolve the domain part of a URI? A DNS servers that is setup with to preform recursive queries or an SQL server 3. What are MX resource records for? 4. How would you find the IP address of example.com from the command line? $ hostname example.com or $ dig example.com 5. How would you instruct a Linux system to use the local network’s DNS cache, located at 192.168.1.254, or the ISP’s DNS cache, located at 1.2.3.4, if the LAN nameserver is unavailable? Tree files to check on. etcman host.conf will tell you about the order option etc Is for static dns resolve etc the file for all your dns needs then edit:/etc/resolv.conf add the following:nameserver 192.168.1.254 nameserver 1.2.3.4 6. How would you instruct a DNS server to respond only to queries from the 137.44.* IP range? Add the following line to the Options clause in /etc/bind/named.conf: allow-query { 137.44.0.0/24 }; 7. How might a resolver attempt to find the IP address of the example domain? A resolver will append several different domains to an unqualified Domain Name producing FQDNS that passes them one at a time....

Words: 265 - Pages: 2

Nt1430 Unit 1

...thousands of people on the Internet. CH 2 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? You have to check your system requirements first off. Then you figure out where your going to install it, and see what options you will install it with. CH3 1. What is a live system? What advantages does it have over an installed system? A live system runs without installing Linux. Once you are finished your operating system boots as normal. 4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? At the beginning of the drive, partition 1 8. When does a Fedora/RHEL system start X by default? When the system enters run level 5 CH 11 1. How does single-user mode differ from multiuser mode? In single user mode only the console user may be logged in. In multi user many peopled may be logged into the system 3. What do the letters of the su command stand for? (Hint: It is not Superuser.) What can you do with su besides give yourself root privileges? How would you log in as Zach if you did not know his password but knew the root password? How would you establish the same environment that Zach has when he first logs in? substitute user. You can give yourself priveleges of any user whose password you know or any user if you are running as root. 7. Develop a strategy for coming up with a password that an intruder would not be likely to guess but that......

Words: 390 - Pages: 2

Nt1430 Unit 1

...Stacie Rollins Wednesday, December 17, 2014 (Nt 1430.U1.GA1) Week 1 Unit 1 Chapter Exercises Chapter 1: 1. What is Free Software? List 3 Characteristics. The code is available free of cost- no charge for the software, source, documentation, or support. 3 Characteristics would be that you are free to study it, redistribute it, and modify it. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation is the principal sponsor of the GNU Project. GNU developed many of the tools, which are part of the GNU/Linux Operating System. Linux is the name of an operating system kernel developed by Linus Torvalds and expanded and improved by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the GNU/Linux Operating System. Chapter 2: 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Chapter 3: 1. What is a live system? What advantages does it have over an installed system? Live......

Words: 579 - Pages: 3

Pt1420 Unit 5 Assignment 1. Homework

...executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than......

Words: 686 - Pages: 3

Pt1420 Unit 5 Assignment 1. Homework

...executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than......

Words: 686 - Pages: 3

Nt1430 Unit 1

...ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation (www.fsf.org) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compiler, that are part of the GNU/Linux Operating System. Linux is the name of an operating system kernel developed by Linus Torvalds and expanded and improved by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the GNU/Linux Operating System. 5. In which language is Linux written? What does the language have to do with the success of Linux? It is written in the C Programming Language. The language allowed Linux to be successful due to being portable capable meaning that it can be moved from machine to machine relatively easily considering that most other languages were machine-dependent (only able to work on one machine). 6. What is a utility program? A utility (program), sometimes referred to as a command, is a program that performs a task that is frequently related to the operating system. A utility is simpler than an application program although there is no clear line separating the two. GNU/Linux distributions, such as Red Hat, include many utilities. You can download...

Words: 4911 - Pages: 20

Nt1430 Unit 3 Lab

...Wanda Gonzalez Thursday 10/16/14 GS1145 Unit 5 My name is Wanda and the five words that I have chosen are Respect, Responsibility, Dependability, Attitude, and Discipline. Dependability means reliable, worthy of trust, and that you can be counted on no matter what. When I say that I am going to do something you can consider it done. My friends and family know that they can depend on me .Responsibility means to be accountable for something within my power. When I was in the military I was in charge of a number of soldiers. It was my job to keep them as safe as possible and assure that they had what they needed to get the job done. I was taught to pay my debts no matter how long it takes. Attitude is a feeling in regards to a person or thing. Thanks to my time in the military I was taught to have a positive can do attitude. All through my life I have always had a matter of fact attitude, tell it like it is whether you like it or not. Discipline is training to act in accordance with rules; drill. In basic training we did the same drills over and over again till we were proficient at it. I was always very disciplined in carrying out my job and my orders. Respect is esteem for a sense of the worth or excellence of a person. I was raised by my grandmother and she taught me respect;” yes mam, no mam” and if we didn’t she would not hesitate to smack me. I have high regards for people in authority such as law enforcement, Commander......

Words: 424 - Pages: 2

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message,......

Words: 270 - Pages: 2