Preview

Is418 Lab8

Satisfactory Essays
Open Document
Open Document
309 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is418 Lab8
IS 418
LAB 8

1. Explain the following command: rpm –qf/bin/ls
- RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.
2. Discuss the purpose of a software repository as it relates to YUM.
- The yum system does not require any routine maintenance. It is useful to disable or remove repository definitions that are no longer required, as each repository that is defined and enabled is checked for every operation. You may also wish to periodically remove files relating to unwanted packages, in order to save disk space
3. How can one ensure a download tar ball is legitimate and hasn’t been tampered with?
- Run a checksum test
4. List and explain at least 3 switches available with the tar command that can be useful in extracting and installing a tarball
- ark
5. List and explain at least 3 switches associated with the rpm command that can be leveraged to verify, list and install rpm packages? tar zxvf makefile.tar.gz cd make file
./install/
6. What security countermeasure can you enable to verify the integrity of download application or tar balls before you perform the installation?
- used Ark to extract the tar ball
7. Explain what hashing is and how does this differ from encryption?
- Hashing is just line of code and it not encrypted
8. If you wanted to know which package a certain program belonged to, what command would you run?
- tar xvzf PACKAGENAME.tar.gz
9. Once you have downloaded an RPM package, what command would you run if you want to extract the files to a directory of your choice
- tar xzvf file.tar.gz
10. Where would you find checksum hashes for all install program in a Fedora Core Linux Server?
- Verification code called a hash computed from the original ISO

You May Also Find These Documents Helpful

  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The e-commerce server could be placed in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from wherever it needs to go.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which command would you give to update all installed packages using yum? == yum update but if you are using older versions the yum update might not work you would need to use the yum up2date command…

    • 1850 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    Online look up of download sites – when a download is started IE checks the source.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1430 Unit 2

    • 393 Words
    • 2 Pages

    4. How can you find out which utilities are available on your system for editing files? Which utilities are available for editing on your system? apropos edit. man -k edit…

    • 393 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    and download its to your computer which this file are safe and virus free. You can read this…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Chapter 2

    • 288 Words
    • 2 Pages

    When you download the SHA1SUMS file, SHA1 is included. This file is useful in determining of the ISO image file that you downloaded was correct. When you use the utility, sha1sum generates a number based on the file. If the number matches the corresponding number in the SHA1SUMS file, the download is correct.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Medical Billing

    • 363 Words
    • 2 Pages

    A CD icon labeled “Silvestri Comp Review PN 4e” will appear on the screen once inserted. Double-click it, then double-click “Silvestri Comp Review PN 4e.osx” to launch the software.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Load Cell

    • 296 Words
    • 1 Page

    mode, four farthest point esteem switches, trigger mode (outside or level), and an IP66 rating.…

    • 296 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    XTC Spreading eBook.

    • 386 Words
    • 2 Pages

    Just search on the internet for a texturepack of MineCraft, when you have one make an post about it and typ some things about the texturepack. You can now put your infected server in the folder and say that it will be done all automatic (They will open it because they are not smart with computers).…

    • 386 Words
    • 2 Pages
    Satisfactory Essays

Related Topics