Free Essay

Linux Networking Unit 1 Assignment

In:

Submitted By ddalmeida
Words 426
Pages 2
Unit 1 Assignment
Chapter 1 ex 1. What is free software? List three characteristics of free software.
Free software is software that is available for anyone to use and modify however they like. 3 characteristics of free software are that, you are free to study, redistribute, and modify it free of cost.
Chapter 2 ex 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve?
Installing the Fedora/RHEL OS is copying the OS files from a CD, DVD, or Flash drive on to the hard drives of the system then setting up the config files so the Linux runs properly on the hardware.
Chapter 3 ex 1. What is a live system? What advantages does it have over an installed system? A live session is a Linux session that is running on your computer without you actually installing Linux on your computer. The advantages you have by running a live session is you can preview the system without installing it and your computer will not be changed.
4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition?
Default layout
8. When does a Fedora/RHEL system start X by default?
To start X by default you need to set run level 5 to be the default and it will start when the system boots.
Chapter 11 ex 1. How does single-user mode differ from multiuser mode
In single user mode, only the console user may be logged in, though the user can edit files and execute multiple programs simultaneousl
3. What do the letters of the su command stand for? (Hint: It is not Superuser.) What can you do with su besides give yourself root privileges? How would you log in as Zach if you did not know his password but knew the root password? How would you establish the same environment that Zach has when he first logs in?
Substitute User, give yourself privileges of any user you know the password for, follow su with Zach while logged in to the root and the root password will allow you to log in as Zach, by using the su command utilty and the root password will alloow you to log on as Zach with the same enviroment.
7. Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember. always use caps symbols and numbers in a word or phrase

Similar Documents

Free Essay

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message, then...

Words: 270 - Pages: 2

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Free Essay

Nt2640

...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for All...

Words: 403 - Pages: 2

Premium Essay

Test

...BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Free Essay

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze...

Words: 799 - Pages: 4

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

Nt2640

...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...

Words: 2573 - Pages: 11

Free Essay

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh and...

Words: 284 - Pages: 2

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Premium Essay

It255

...System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18

Free Essay

Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos...

Words: 1139 - Pages: 5

Premium Essay

Nt1310 Unit 3 Research Assignment

...Desktop vs. Mobile Research assignment Computer science 3B MUNWANA THENDO 201112421   TABLE OF CONTENT  Introduction------------------------------------------------------------------------------ 2  Mainstream kernel VS Mobile device kernel-----------------------------------------2  Difference between Windows and Windows RT----------------------------------- 3  Windows------------------------------------------------------------------------------.4  Windows RT--------------------------------------------------------------------------4  Comparison of Windows and Windows RT---------------------------------- 4-5  Difference between Linux and Android-------------------------------------------- 6-7  Difference between Mac...

Words: 2587 - Pages: 11