Preview

Lab 1

Good Essays
Open Document
Open Document
822 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 1
1. During the install, the option to sync with NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
UNIX systems base their notion of time on interrupts generated by the hardware clock. Delays in processing these interrupts because UNIX systems clocks to lose time slowly but erratically. These small changes in timekeeping are what the time scientist call jitter. The Time protocol provided a server's notion of time in a machine readable format, and there is also an ICMP Timestamp message
2. During the install, a password has been set for the “root” user. What is the “root “user, and when it is appropriate to user this account.
The root user is the administrator of the account. You will use this account only when you are making important changes in the system.
3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.
During Linux installation, deselecting X Window packages, especially the base packages, will return errors concerning failed dependencies. You can safely deselect all of these applications, in addition to X itself.
4. During the installation process it asks what the options given to create the partition are? Name them. Ext 2 and Ext 4
5. Why is it important to partition a Linux system correctly?
For security. Once a disk is divided into several partitions, directories and files of different categories may be stored in different partitions.
6. What is the significance of the SWAP partition in a Linux system? What different ways can the swap space be configured and why would you recommend one over the other?
For server (web) performance. Swap space is an area on a disk that temporarily holds a process memory image. When physical memory demand is sufficiently low, process memory images are brought back into physical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Basic disks enable you to create simple volumes and then extend or shrink them as needed.…

    • 591 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Basic disks enable you to create simple volumes and then extend or shrink them as needed.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    2. What is meant by swapping? – Taking a whole or piece of memory and store it completely on a device.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2

    • 310 Words
    • 2 Pages

    Question 1: What is the name of the computer you are working from? The Name of the computer is W2K8xx…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM?…

    • 2385 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 1 1

    • 814 Words
    • 9 Pages

    Using the example in Figure 1-5 and the steps that followed, create a binary conversion for the decimal value 200.…

    • 814 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    Lab 2

    • 931 Words
    • 4 Pages

    A hazard of working with hydrochloric acid is that it could burn the skin if too much comes in contact with skin (Sciencelab1). If this happens rinse skin thoroughly under running water and alert the lab professor.…

    • 931 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    lab 1

    • 636 Words
    • 3 Pages

    Are there any safety concerns associated with this exercise? If so, list what they are and what precautions should be taken.…

    • 636 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 2

    • 430 Words
    • 2 Pages

    1. How does a false positive alarm differ from a false negative one? From a security perspective, which is least desirable? A false positive attack is where the system IDPS was alarmed but no attack ever occurred. The false negative is where an actual attack occurs and the IDPS isn’t alarmed at all. The least desirable would definitely be the false negative, if an attack does occur and the IDPS doesn’t even alarm well what’s the point in even having it if it isn’t going to alarm.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Your OS will use the hard drive as a "swap file" or virtual memory, if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are slower than RAM. You must have enough memory, adding more does not help if you are not doing anything that needs more memory. Today, a modern PC and a modern OS need about 4 gigs to achieve this for most standard users. You want enough RAM so the OS doesn't start using the hard drive as memory.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    SVAD111 Session 1 Project

    • 917 Words
    • 4 Pages

    C) What does that screen shot tell you about your system? Does your system support hardware virtualization?…

    • 917 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    RYS 1

    • 389 Words
    • 2 Pages

    Used to store a copy of your data in case your main file becomes corrupted and needs to be restored…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File System and Group

    • 788 Words
    • 4 Pages

    Root account: It is a super account in UNIX system and created when the Operating System installed. It has complete, unfettered control of the system and can run any commands without any restriction. This user account in UNIX system is treated as an administration.…

    • 788 Words
    • 4 Pages
    Good Essays