Preview

unit 3 homework

Satisfactory Essays
Open Document
Open Document
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 3 homework
Unit 3 homework

1. What printing protocols are supported by CUPS?
IPP, LPD/LPR, HTTP, SMB, JetDirect protocols
2. Of those protocols supported by CUPS, which one is the native CUPS protocol?
IPP
3. On a Fedora system, there are three main tools or sets of tools for configuring a CUPS printer. What are they? system-config-printer, CUPS web interface, and lpadmin
4. What is a URI? (Give an explanation, not just an acronym expansion.)
A Universal Resource Indicator is a standard for describing the location of a resource including the protocol and port required to access it.
5. Using the command line tools, how would you add the following to print to CUPS? Model Wizbang 9000 PPD file Wizbang_9000_ps.ppd.gz (already in the foomatic database) Connected to a JetDirect print server with an IP of 172.20.20.76 Accessible to all users
Lpadmin –p “Wizbang 9000” –E –v socket://172.20.20.76 –m
Wizbang_9000_ps.ppd.gz
6. SSH 1 is vulnerable to what kind of attack?
Man in the middle attack

7. SSH can be used to forward which otherwise insecure protocol?
It can be used for a lot of protocols including Telnet and VNC.
8. The SSH client stores keys from known servers in which file?
$HOME/.ssh/known_host file.
9. Where is the main SSH server configuration file located and what is its name?
/etc/ssh/sshd_config
10. How would you allow the users Archie, Jughead, and Veronica onto your SSH server and no one else?
Edit etc/host.deny and type sshd: all. Then edit etc/host.allow and add sshd: Archie sshd: jughead sshd: veronica.

You May Also Find These Documents Helpful

  • Powerful Essays

    Week 6 Assignment It/286

    • 1310 Words
    • 6 Pages

    In this worksheet, you must identify solutions to four separate computer printer problems. For each solution, you must prepare an answer of at least 150 words in each Answer box.…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve?…

    • 2815 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    2. Setting a MAC filter is a good way to filter who has access to your network.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    The first 8 bits of the host address and set the rest of the numbers in the address to 0.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    1. Which commands can you use from the command line to send a file to the default printer?…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Eng110 Unit 3 Assignment

    • 1079 Words
    • 5 Pages

    M is off center and above eye level in the shot as well as the little girls reflection in the mirror.…

    • 1079 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 2 Writing Assignment

    • 692 Words
    • 3 Pages

    The “job force” of Canebreak would have made Walt Disney smile! Every slave had an assigned job…

    • 692 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    User-friendly is a term used in the software development to describe programs that are easy to use.…

    • 848 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 3 essay 3

    • 638 Words
    • 3 Pages

    Between 600 and 1450 CE., trade and exchange continually remained important and influential in around Eurasia and as well as in the Mexica society. Trade and exchange were main ideas that were both useful and necessary for success during this time. In Eurasia the use of the Silk Road and the Indian Ocean were both used as important trade routes. The Monsoons in the Indian Ocean were able to widen their agricultural standpoint allowing them to trade internally not only with their new goods but also with specific regions and their goods. In the Mexica society, surrounding territories had to pay a tribute to the Aztec capital and also had traded with surrounding areas. In the Islamic empires, goods such as cotton and spices were traded which were a continuous trade, in addition to the use of the Silk Road and the Indian Ocean, however, this led to new inventions, which then created the Aztec empire and later the crusades.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    27. Which of the following is a type of RAM that does not need to be refreshed?…

    • 475 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    Next, select the printer type. Refer to Section 33.5, “Selecting the Printer Model and Finishing” for details.…

    • 1850 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Teriostar Product Research

    • 1954 Words
    • 8 Pages

    1. Best Productivity in Low Class o High speed printing and scanning 2. Less Downtime o Process cartridge concept o Extended life of process cartridge and double charge-wire unit Ease-to3. Focusing on Ease-to-Use o Easy-to-use large 8.5” color touch screen / Automatic roll paper width detection / Dual media output slots 4. Compact Design o For small office environment o 1-way access/Front Loading & Front Media Out 5. High Quality Scanning o Newly designed mechanism o Dual Light-sources Scanner 6. Improved Workflow o Parallel Processing / High Quality Digital Copy / Submission / Save to Job Box / Scan to Print / Job control / User Authentication 7. TerioStation Software o Provided as in-box accessory…

    • 1954 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The second type of network security technologies that can be implemented by the TedBrothers Inc are the SSH. SHH are the Secure Shell or Secure Socket Shell. It is a UNIX-based…

    • 1337 Words
    • 6 Pages
    Powerful Essays

Related Topics