Premium Essay

Unit 8 It302

In:

Submitted By Acepesos
Words 319
Pages 2
Ariel Ruiz It302 Assignment 8.1 1. Which company originally created NIS under the name Yellow Pages, and then later changed the name since it was owned by “another corporation”? NIS was developed by Sun Microsystems. 2. What configuration file is used to tell Linux which system (NIS, DNS, files, etc.) to use for name resolution, authentication, etc.? The /etc/ncsd.conf configuration file is used to tell Linux which system to use for name resolution, authentication, etc. 3. The file format for an NIS database file is called a dbm. 4. Which Linux file generates two maps in NIS? The /etc/passwd file generates two maps: one indexed by username, the other indexed by UID. These maps are named passwd.byname and passwd.byuid. 5. What utility is used to display raw information from an NIS server? The ypmatch utility or ypcat utility is used to display raw information from an NIS server. 6. Which is the name of the init script for LDAP: ldap or slapd The name of the init script for LDAP is slapd. 7. What is the name for the root, or top level, entry in an LDAP directory?
DSE is the root, or top level entry in an LDAP directory. 8. Expand and explain the following acronyms: a. CN = Common Name = is the attribute value used in the Relative Distinguished Name (RDN) b. DC = Domain Component = my-domain c. DN = Distinguished Name = uniquely identifies each entry in an LDAP directory. d. DSE = DSA Specific Entry = is the root, or top-level entry in an LDAP directory e. LDIF = LDAP Data Interchange Format = is used to represent LDAP entries in text form 9. On which port does unencrypted LDAP traffic go? Unencrypted LDAP traffic goes on port 389. 10. What utility is used to encrypt a password for use with LDAP? Use the slappasswd utility to encrypt a password for use with

Similar Documents

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18