Preview

Lab 5 Assessment Worksheet

Satisfactory Essays
Open Document
Open Document
316 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 5 Assessment Worksheet
Lab #5 – Assessment Worksheet
Apply Hardened Security for Linux Services & Applications
1. When configuring services, what Linux directory typically contains server configuration files?
/etc
2. What command disables remote access to the MySQL Database? Is this a security hardening best practice?
Bind-address=YOUR-SERVER-IP, If you don 't need remote access, then binding should be considered a best practice.
3. What is a Linux runlevel for a specific service of application? What command allows you to define the runlevel uniquely for a service or application?
0 - System halt; no activity, the system can be safely powered down. 1 - Single user. 2 - Multiple users, no NFS (network filesystem). 3 - Multiple users, command line interface; the standard runlevel for most Linux-based server hardware. 4 - User-definable. 5 - Multiple users, GUI. 6 – Reboot. telinit
4. What is the Apache Web Server? Review the /etc/httpd/conf/httpd.conf configuration file, and point out a setting that could enhance security.
Web server application noted in its help creating the World Wide Web, ResourceConfig /dev/null
5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use of telnet is discouraged.
Associated messages including passwords are sent in cleat text so if a hacker is using a packet sniffer then he now has access to any usernames or passwords.
6. What are Symbolic links?
A special type of file that contains a reference to another file or directory in the form of an absolute or relative path
7. Why is it recommended to disable Symbolic Links in MySQL?
To prevent various security risks
8. Why would you add the ‘skip-networking’ command?
To prevent remote access and to disallow access to load a local file.
9. What two files does sendmail create while processing a message?
File: "df": This stores the body of the message. File: "qf": This stores the headers and other information.
10. What command can you use locally to find the sendmail’s version number?



Links: in MySQL? To prevent various security risks 8. Why would you add the ‘skip-networking’ command? To prevent remote access and to disallow access to load a local file. 9. What two files does sendmail create while processing a message? File: "df": This stores the body of the message. File: "qf": This stores the headers and other information. 10. What command can you use locally to find the sendmail’s version number? sendmail -d0.4 -bv root

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 lab worksheet

    • 87 Words
    • 1 Page

    The Integument: Structure and Functions - WORD DOCUMENT - SC121 -01 & 06 1. Identify the highlighted tissue. 2. Identify the highlighted layer. 3.…

    • 87 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    -A INPUT -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT - allows all traffic to the loopback network coming from the loopback device.…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Chapters 1-4

    • 1910 Words
    • 8 Pages

    6. The Windows shell operates in _____ mode and the kernel operates in _____ mode.…

    • 1910 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Assignment1

    • 354 Words
    • 5 Pages

    Use the table in the data file below to answer these questions regarding file structure:…

    • 354 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    NT1430 Linux Networking

    • 1121 Words
    • 5 Pages

    • grep is a program that searches for a string within a directory or command output…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Linux Interview Questions

    • 10428 Words
    • 42 Pages

    1. How do you take a single line of input from the user in a shell script?…

    • 10428 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    operating system

    • 1174 Words
    • 5 Pages

    Kernel-level thread; this is a type of threading in which all of the work of thread management is done by the kernel.…

    • 1174 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access - list command. What sequence number does the new entry have?…

    • 2217 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    mbn,b,m

    • 272 Words
    • 2 Pages

    10. Make sure parameter file “P_MessageName” has equal number of unique data (MESSAGE_001 ……..MESSAGE_XXX) as processed (Input message count).…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mcom

    • 2851 Words
    • 12 Pages

    large number and wide range of messages at their disposal that they can choose to send.…

    • 2851 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Ms Dos

    • 896 Words
    • 4 Pages

    3. These commands can be used as long as DOS is running on the system.…

    • 896 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    SDLC

    • 538 Words
    • 3 Pages

    - 2. Look-up files. Contain static or reference information to validate information entered into the system is correct.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A file descriptor(or file header includes information that describes the file, such as the field names and their data types , and the addresses of the file blocks on disk. Records are stored on disk blocks. The blocking factor bfr or a file is the (average) number of file records stored in a disk block. A file can have fixed-length records or variable-length records.…

    • 1369 Words
    • 6 Pages
    Powerful Essays