Free Essay

It302 Activity 1

In:

Submitted By Insaneshort08
Words 831
Pages 4
Chapter 2 Installation Overview 1. A Net Boot CD is a way to install a new system from a hard disk or over a network. 2. Three considerations for planning an installation are; a. SELinux improves system security by implementing mandatory access control policies in the Fedora kernel b. Install a Graphical desktop environment (GUI) such as GNOME and/or KDE. c. Install additional software and services packages to fit the need of the user. 3. By default Fedora divides the disk into three partitions, including ‘/boot’ and Logical Volume Manager (LVM). 4. Manual partitioning the hard disk has its advantages, such as being able to isolate a filesystem for security or backup needs. 5. The / (root) partition is the main filesystem on the hard disk. Any new created directories will become part of the root filesystem unless a filesystem is created. 6. The swap partition is where Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing. 7. The /boot partition holds the hernel and other data the system needs when it boots. In order for the /boot partition to work properly it must be one of the first partitions on the disk. 8. The /var (variable) partition holds the bulk of system logs, package information, and accounting data. The /var/log partition is commonly used in a separate partition to isolate system logs from other files in the /var directory. 9. The /home partition is ideal for making it a separate filesystem to keep users from filling up the systems directory, with their own filesystem partition. 10. The /usr partition is useful if you plan to export the directory to another system to improve security. Creating /usr/local and /opt to separate partitions will allow for all the additional software to be stored in its own filesystem freeing up the users disk space. 11. To do a network installation you locate the ISO image file from a server using FTP, NFS, or HTTP on the machine installing linux. This installation is very time consuming, but can be done with the installation CD, the Net Boot CD, the install DVD, or a USB flash drive.
Chapter 3 Step-by-Step Installation 12. The software selection is where you can choose to add other software besides Anaconda’s default software. These options include Office and Productivity, Software Development, and Web Server. 13. When installing SELinux (Security Enhanced Linux) there is two modes to choose from. The default policy, Enforcing, which prevents any user or program from doing anything that is not permitted by the policy. The other policy choice is Permissive, which issues warnings but does not enforce the policy. 14. The askmethod command line utility that presents a choice for installation sources. 15. Kickstart is a Fedora program that completely or partially automates the same installation and post-installation configuration on one or more machines. 16. The X Window system is where the user decides on what graphical desktop environment will be used. Options for X Windows System include GNOME and/or KDE. 17. Daemon is a program that is not invoked explicitly but lays dormant, waiting for some condition to occur.
Chapter 11 System Administration 18. The telinit utility allows a user to bring the system down, reboot the system, or change between recovery and multiuser modes. 19. The inittab file is for compatibility with the old init daemon that allows the system to boot to a different runlevel. Runlevel’s 0, 1, and 6 will cause the system to shut down. 20. By default, Fedora systems boot to runlevel 5. 21. A rc (run command) script is a. The /ect/rc.d/rcn.d directories contain scripts whose names begin with the letters K and S. Each K (kill) script is executed with an argument of stop and each S (start) script is executed with an argument of start. This arrangement allows the person who sets up these files to control which services are stopped and which are started in what order. 22. The service utility can report on or change the status of any of the systems services. The command /sbin/services –status-all displays the status of all system services. 23. The system-config-services utility displays the Service Configuration window which can turn the system services on and off immediately, and it controls which services are stopped and started when the system enters and leaves runlevels 2-5. 24. The chkconfig utility can add, remove, list startup information, and check the state of the system services, changing the configuration only. The /sbin/chkconfig --list command will show a list of all services. You can check how a specific daemon is configured by adding its name to the command /sbin/chkconfig –list (specific daemon). If you omit the –level, chkconfig defaults to runlevels 2, 3, 4, and 5. When changing chkconfig setting using a service command allows you to instantly reboot the system for faster changes.

Similar Documents

Premium Essay

It302 Final Exam Reveiw Answers

...IT302 Linux Administration Final Exam Revew Preparation Sheet and Study Guide 1. Which runlevel is textual multi-user mode? A. 1 B. 3 C. 5 D. 6 2. Which system script contains the default runlevel? A. /etc/default.target B. fstab.default C. profile.local D. default.runlevel Use the following information to answer Questions 3-5: A system administrator is manually setting up a new daemon named analyzed. The daemon should be set to run at runlevel 3 and be the very last daemon to load. 3. What should the link to start the daemon be named? A. skanalyzed1 B. 100analyzedstartup C. analyzedstart --last D. S99analyzed 4. Which of the following commands would stop the analyzed daemon? A. analyzed stop B. chkconfig –level 35 analyzed C. service analyzed stop D. chkconfig analyzed boot 5. Which of the following commands would tell the system at which runlevels to start analyzed? A. analyzed stop B. chkconfig –level 35 analyzed C. service analyzed stop D. chkconfig analyzed bootLinux Professor Green IT302 Linux Administration 6. Which of the following commands would let you most safely switch to runlevel 2 without rebooting the computer? A. boot 2 B. telinit 2 C. init 2 D. rl 2 7. Which type of control does SELinux implement? A. Discretionary access control B. Media access control C. Role-based access control D. Mandatory access control 8. Which of the following is not a SELinux state? A. Permissive B. Monitoring C. Enforcing D. Disabled 9. The files hosts.allow and hosts.deny belong...

Words: 1258 - Pages: 6

Free Essay

It302-Unit6

...IT302-Unit6A- Kaplan University Part1 – Introduction. The approach I used in unit 5 was a generic design which is flexible in nature with a basic layout planned so it can be easily molded, or modified to fulfill a variety of needs or applications. The wireframe associated with the design is shown without a supporting structure. The associated structure will be dictated by its application and placement. Part 2. WIMP. WIMP is an established approach that has become commonplace in its usage with and basic functionality on kiosks. The term WIMP stands for windows, icons, menus and pointers which are the primary objects used in the presentation of data to the customer or client and the means to communicate with the system. The term was coined by Merzouga Wilberts in 1980 that was part of the working group at Xerox Parc that ultimately developed the Graphical User Interface under the guidance of Allen Kay (Charlotte). Although still used, the term “WIMP” is slowly being overtaken by newer approaches and standards. As stated by Allen Kay, "We've taken the WIMP interface as far as it can go," he added, referring to the Windows-icon-mouse-pull-down menu” (Laurie, 1995). The first and most possibly the largest single item that the user sees is the monitor. Not only is it the most visible item we see whether the kiosk unit is handheld or free standing, it is the device that we depend on most for our visual interaction with...

Words: 1787 - Pages: 8

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18