PROG1225 Test 2 Study Quiz
150 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which log file contains information and error messages generated by the cron and at daemons?

  • cron (correct)
  • boot.log
  • secure
  • messages
  • Which package manager is associated with the rpm command?

  • Debian Package Manager
  • wtmp
  • Red Hat Package Manager (correct)
  • Xorg.0.log
  • Which log file provides detailed information regarding daemon startup and system messages?

  • syslog (correct)
  • rpmpkgs
  • lastlog
  • dmesg
  • Which log file contains a history of all login sessions?

    <p>wtmp</p> Signup and view all the answers

    Which log file contains information and error messages generated by X Windows?

    <p>XFree86</p> Signup and view all the answers

    Which log file provides basic information regarding daemon startup obtained during system initialization?

    <p>boot.log</p> Signup and view all the answers

    What command in Linux allows a user to switch to the root user if allowed by the distribution?

    <p>su Command (Switch User or Super User or Substitute User)</p> Signup and view all the answers

    In Windows 10, which tab in Task Manager shows currently running processes and resource utilization?

    <p>Process Tab</p> Signup and view all the answers

    What does the sudo command in Linux prefix to any command that requires administrative rights?

    <p>Super User Do</p> Signup and view all the answers

    Which command is used in Linux to mount a vfat file system on a specific device to a specific directory?

    <p>sudo mount -t vfat /dev/sdc1 /media/usb</p> Signup and view all the answers

    What type of commands in Linux require superuser (administrator or root user) privileges?

    <p>sudo commands</p> Signup and view all the answers

    In Windows 10 Task Manager, how are running processes sorted in the Process Tab?

    <p>Alphabetically</p> Signup and view all the answers

    Which command is used to attach a file system to a directory in Linux?

    <p>mount</p> Signup and view all the answers

    What is the purpose of the /etc/fstab file in Linux?

    <p>To create mount entries for other storage devices for automatic mounting</p> Signup and view all the answers

    Which command is used to determine the device to mount in Linux?

    <p>fdisk -l</p> Signup and view all the answers

    What type of links create multiple copies of the same file linked together in Linux?

    <p>Hard links</p> Signup and view all the answers

    Which file contains environment variable settings and programs executed when a user logs in?

    <p>/etc/profile</p> Signup and view all the answers

    What is the purpose of the mount command in Linux?

    <p>To attach a file system to a directory</p> Signup and view all the answers

    What does the top command display?

    <p>Real-time system statistics with a 5-second delay</p> Signup and view all the answers

    Which directory in Linux contains system executables?

    <p>/sbin</p> Signup and view all the answers

    What does the vmstat command report on?

    <p>All of the above</p> Signup and view all the answers

    Which tool in Linux tracks hardware and software problems and changes to the system?

    <p>Automatic Bug Reporting Tool (ABRT)</p> Signup and view all the answers

    What does the uptime command display?

    <p>All of the above</p> Signup and view all the answers

    What does the /proc directory in Linux provide?

    <p>Runtime system information</p> Signup and view all the answers

    Which tool in Windows Task Manager allows users to view and manage system programs running in the background?

    <p>Services tab</p> Signup and view all the answers

    What does the ps command in Linux do?

    <p>Lists all processes running on the system</p> Signup and view all the answers

    What can be changed in the App History tab in Windows Task Manager?

    <p>History for all processes can be shown</p> Signup and view all the answers

    What does the kill command in Linux do with the option 'kill -9 PID'?

    <p>Stops a process</p> Signup and view all the answers

    What does the GNOME System Monitor's Processes tab provide options for?

    <p>Controlling displayed processes and view dependencies</p> Signup and view all the answers

    What can Performance Monitor in Windows 10 be used for?

    <p>Collecting and viewing real-time data about a system's usage activities</p> Signup and view all the answers

    What are the respective port numbers for SNMP and RDP protocols in TCP/IP networking?

    <p>SNMP: 161, RDP: 3389</p> Signup and view all the answers

    What is the purpose of APIPA in TCP/IP networking?

    <p>To automatically assign IP addresses to systems when DHCP is not available</p> Signup and view all the answers

    What is the function of the Transport layer in the TCP/IP model?

    <p>To provide end-to-end communication between applications</p> Signup and view all the answers

    Which protocol is commonly used for secure file transfer in TCP/IP networking?

    <p>SSH (Secure Shell)</p> Signup and view all the answers

    What is the primary function of DNS in TCP/IP networking?

    <p>To translate domain names to IP addresses</p> Signup and view all the answers

    Which TCP/IP protocol is commonly used for sending and receiving email?

    <p>SMTP (Simple Mail Transfer Protocol)</p> Signup and view all the answers

    What is the purpose of the Network Interface layer in the TCP/IP model?

    <p>To transmit data over the physical network medium</p> Signup and view all the answers

    What is the purpose of a MAC address on a local area network (LAN)?

    <p>To uniquely identify a computer on the network</p> Signup and view all the answers

    Which layer of the OSI Reference Model is responsible for transporting application layer payloads using TCP for guaranteed delivery and UDP for fast transmission?

    <p>Transport Layer</p> Signup and view all the answers

    What is the purpose of IP addresses in network communication?

    <p>To find computers on the Internet and local networks</p> Signup and view all the answers

    Which layer of the OSI Reference Model interfaces with the physical hardware on the local network and uses MAC addresses for transmitting data?

    <p>Data Link Layer</p> Signup and view all the answers

    What type of network connections can be used for homes and offices?

    <p>Wireless (Wi-Fi, satellite, cellular)</p> Signup and view all the answers

    What is the purpose of port numbers in network communication?

    <p>To uniquely identify the type of application on a computer</p> Signup and view all the answers

    What is the responsibility of the Network Layer in the OSI Reference Model?

    <p>To move messages from one node to another using IP protocol and routing protocols</p> Signup and view all the answers

    Which suite of protocols is commonly used for almost all networks today, including the Internet?

    <p>TCP/IP (Transmission Control Protocol/Internet Protocol)</p> Signup and view all the answers

    In a client/server model, which computer takes on the role of making requests from the other computer?

    <p>The client computer</p> Signup and view all the answers

    At which level does the network communication start with an application passing a request to the OS, which then passes the request to the network card and on to the network?

    <p>Application Level</p> Signup and view all the answers

    What is the primary function of the hardware level in network communication?

    <p>Consists of a network card and connection to the network</p> Signup and view all the answers

    In the context of networking communication, what are the three basic steps in communication?

    <p>One computer finding the other, agreeing on communication methods and rules, and making requests</p> Signup and view all the answers

    Which model involves two computers making requests from each other, such as two computers on a home network sharing files?

    <p>Peer-to-peer model</p> Signup and view all the answers

    What must two devices use in order to communicate effectively in network communication?

    <p>The same protocols</p> Signup and view all the answers

    What type of address specifies a single node on a network in IPv6?

    <p>Link local address</p> Signup and view all the answers

    What type of address in IPv6 can identify multiple destinations, with packets delivered to the closest destination?

    <p>Anycast address</p> Signup and view all the answers

    What is the purpose of a fully qualified domain name (FQDN) in networking?

    <p>Identifies a computer and the network to which it belongs</p> Signup and view all the answers

    Which protocol is used by a DNS server to find an IP address for a computer when the fully qualified domain name is known?

    <p>DNS</p> Signup and view all the answers

    What is the subnet ID in IPv6 used for?

    <p>Identifies a subnet</p> Signup and view all the answers

    What does the DNS Client do when it tries to resolve a computer name to an IP address?

    <p>Looks in the DNS cache stored in memory</p> Signup and view all the answers

    What does the first 64 bits of a link local address in IPv6 always start with?

    <p>fe80:0000:0000:0000 (in hex)</p> Signup and view all the answers

    What is the purpose of a unique local address in IPv6?

    <p>Is a private address that can travel across subnets within the private network</p> Signup and view all the answers

    What does the character-based name 'Host Name' represent in networking?

    <p>The name of a computer and can be used in place of its IP address</p> Signup and view all the answers

    What technology is commonly used for a PAN to communicate at close range?

    <p>Bluetooth</p> Signup and view all the answers

    In which type of network are workstations, servers, printers, and other devices used to communicate and share resources?

    <p>LAN</p> Signup and view all the answers

    What technology is commonly used in a MAN to cover a large campus or city?

    <p>Ethernet over fiber optic cable</p> Signup and view all the answers

    Which type of network covers a large area and is made up of many smaller networks, like the Internet?

    <p>WAN</p> Signup and view all the answers

    What technology is commonly used for a WLAN where network cabling is inconvenient to install or use?

    <p>Wi-Fi</p> Signup and view all the answers

    What does a LAN cover?

    <p>Small local area</p> Signup and view all the answers

    What is a characteristic of a PAN?

    <p>Consists of personal devices communicating at close range</p> Signup and view all the answers

    What is a characteristic of a MAN?

    <p>Covers large campus or city</p> Signup and view all the answers

    What is a characteristic of a WLAN?

    <p>Uses wireless connections where network cabling is inconvenient</p> Signup and view all the answers

    What is a characteristic of a WAN?

    <p>Covers a large area made up of many smaller networks</p> Signup and view all the answers

    Which technology is used for providing fault tolerant data storage in a separate standalone device on a local area network?

    <p>NAS</p> Signup and view all the answers

    Which RAID level provides fault tolerance but no performance increase?

    <p>RAID Level 1</p> Signup and view all the answers

    Which storage technology is the server equivalent of SATA but with more capabilities?

    <p>SAS</p> Signup and view all the answers

    Which protocol is used for fast transmissions over LANs, WANs, and the Internet mainly for storage on a SAN?

    <p>iSCSI</p> Signup and view all the answers

    What is the purpose of a UPS (Uninterruptible Power Supply) in networking and server hardware?

    <p>To serve as a battery backup during blackouts</p> Signup and view all the answers

    What is the function of redundant hardware in networking and server hardware?

    <p>To provide fault tolerance</p> Signup and view all the answers

    Which protocol is commonly used for almost all networks today, including the Internet?

    <p>TCP</p> Signup and view all the answers

    What is the primary role of Fiber Channel (FC) in networking?

    <p>To provide fault tolerance for data storage</p> Signup and view all the answers

    What is the purpose of iSCSI (Internet SCSI) in networking?

    <p>To provide fault tolerance for data storage</p> Signup and view all the answers

    What is the function of Tape Drives in networking and server hardware?

    <p>To be used for backing up data</p> Signup and view all the answers

    What is the maximum speed that a dedicated fiber optic line can offer?

    <p>43 Tbps</p> Signup and view all the answers

    What is the maximum speed Wi-Fi based on IEEE 802.11 standards can offer for 802.11n?

    <p>600 Mbps</p> Signup and view all the answers

    What is the speed range for 3G cellular connections?

    <p>200 Kbps to 4 Mbps</p> Signup and view all the answers

    What is the primary function of a network switch?

    <p>Transmit data only to the intended device</p> Signup and view all the answers

    What is the maximum speed that cable line connections can reach?

    <p>160 Mbps</p> Signup and view all the answers

    What is the primary function of a network router?

    <p>Manage traffic between networks</p> Signup and view all the answers

    What is the primary function of a network bridge?

    <p>Manage traffic between segments of a network</p> Signup and view all the answers

    What is the maximum speed that a satellite connection can offer?

    <p>15 Mbps</p> Signup and view all the answers

    What is the maximum speed for Gigabit Ethernet?

    <p>1 Gbps</p> Signup and view all the answers

    What is the maximum speed for Fast Ethernet?

    <p>100 Mbps</p> Signup and view all the answers

    What is the primary difference between a server operating system and a desktop operating system?

    <p>Server operating systems can take on a particular role more effectively than a desktop OS.</p> Signup and view all the answers

    What is the structure of a computer name on the Internet typically expressed as?

    <p>host.domain.tld</p> Signup and view all the answers

    What is the naming structure called for a computer name expressed as host.domain.tld?

    <p>FQDN (Fully Qualified Domain Name)</p> Signup and view all the answers

    What type of database is the DNS (Domain Name System)?

    <p>Distributed hierarchical database</p> Signup and view all the answers

    What is the DNS naming hierarchy described as?

    <p>An inverted tree with the root at the top</p> Signup and view all the answers

    What is the purpose of the DNS lookup process?

    <p>To resolve a computer name to an IP address</p> Signup and view all the answers

    What is the term for the entire DNS tree?

    <p>DNS namespace</p> Signup and view all the answers

    Which type of server contains the master copy of all DNS records for a domain?

    <p>Authoritative Server</p> Signup and view all the answers

    What is the responsibility of Root Servers in the DNS hierarchy?

    <p>Managing top-level domain names</p> Signup and view all the answers

    What is the primary function of DHCP (Dynamic Host Configuration Protocol) in networking?

    <p>Assigning IP addresses automatically</p> Signup and view all the answers

    Which type of DNS query involves the local DNS server iteratively querying root and TLD servers to resolve the domain name?

    <p>Iterative query</p> Signup and view all the answers

    What is the purpose of Forward Lookup Zone (FLZ) in DNS?

    <p>Resolving domain names to IP addresses</p> Signup and view all the answers

    Which type of DNS zone is responsible for mapping IP addresses to domain names?

    <p>Reverse Lookup Zone (RLZ)</p> Signup and view all the answers

    What role does the DNS client play in the DNS lookup process?

    <p>Resolving domain names to IP addresses</p> Signup and view all the answers

    What is the purpose of a link-local address in IPv6 autoconfiguration?

    <p>To provide a unique address for communication within the local network</p> Signup and view all the answers

    What does the Autonomous flag in a router advertisement message indicate in IPv6 autoconfiguration?

    <p>The prefix in the router advertisement can be used for address configuration</p> Signup and view all the answers

    What is the primary function of a Web Server in a network environment?

    <p>Store, process, and deliver website pages to users using the HTTP protocol</p> Signup and view all the answers

    What is the main function of an Email Server in a network environment?

    <p>Accept email and route it over the Internet using the SMTP protocol</p> Signup and view all the answers

    What is the primary function of an NTP (Network Time Protocol) Server?

    <p>Serve 'correct' time and date requests</p> Signup and view all the answers

    What is the primary function of an Authentication Server in a network environment?

    <p>Authenticate the credentials of users, usually account names and passwords</p> Signup and view all the answers

    What is the primary function of a Proxy Server in a network environment?

    <p>Act as a mediator between a client program and an external server to filter requests</p> Signup and view all the answers

    What is the primary function of an NIS (Network Information Service) Server?

    <p>Coordinate common configuration files across multiple computers in a LAN</p> Signup and view all the answers

    What is the primary function of a Print Server in a network environment?

    <p>Manage printers and print requests within a LAN</p> Signup and view all the answers

    What is the purpose of DHCPDISCOVER in the DHCP address assignment process?

    <p>To request an IP address from an available DHCP server</p> Signup and view all the answers

    In IPv6, how can the network ID (prefix) be assigned?

    <p>Through stateless or stateful autoconfiguration or DHCPv6</p> Signup and view all the answers

    What is the purpose of DHCPACK in the DHCP address assignment process?

    <p>To acknowledge the DHCP server's response, completing the transaction</p> Signup and view all the answers

    What is a method for assigning the IPv6 interface ID?

    <p>Using the MAC address</p> Signup and view all the answers

    When does the lease renewal process involve a DHCPREQUEST?

    <p>When the lease is 50% expired</p> Signup and view all the answers

    In IPv6, what does the network ID (prefix) consist of?

    <p>Network ID and an interface ID</p> Signup and view all the answers

    What is a common situation for lease renewal failure in DHCP?

    <p>Server inability to honor renewal and lack of server response</p> Signup and view all the answers

    What is the purpose of the /etc/shadow file in a Linux system?

    <p>It contains the encrypted password and expiration information for each user.</p> Signup and view all the answers

    What is the primary function of the pwconv command in Linux?

    <p>To revert from using two files (/etc/passwd and /etc/shadow) to one</p> Signup and view all the answers

    What is the purpose of the authentication process in a Linux system?

    <p>To verify the user's identity using a valid username and password</p> Signup and view all the answers

    What is the purpose of the /etc/passwd file in a Linux system?

    <p>It contains the user account information for each user.</p> Signup and view all the answers

    What is the purpose of the pwck command in a Linux system?

    <p>To check the integrity of the /etc/passwd and /etc/shadow files</p> Signup and view all the answers

    What is the purpose of the GUI in administering users and groups in a Linux system?

    <p>To provide a user-friendly interface for managing user accounts and groups</p> Signup and view all the answers

    Which command is used to decompress files in Linux?

    <p>gzip -d</p> Signup and view all the answers

    Which command is used for full and incremental backups in Linux?

    <p>dump</p> Signup and view all the answers

    Which remote administration method for Linux servers does not encrypt communications?

    <p>Telnet</p> Signup and view all the answers

    Which printing system is an older printing system with a lower compression ratio than gzip?

    <p>LPD</p> Signup and view all the answers

    Which command is used to create, extract, and compress archives in Linux?

    <p>tar</p> Signup and view all the answers

    Which compression utility in Linux supports long filenames and device files for backup and restore?

    <p>cpio</p> Signup and view all the answers

    Which file contains encrypted passwords, last password change date, password expiration details, and account disablement information in Linux?

    <p>shadow file</p> Signup and view all the answers

    Which command is used to modify user account information in Linux?

    <p>usermod command</p> Signup and view all the answers

    What does the groupadd command do in Linux?

    <p>Adds a new group</p> Signup and view all the answers

    Which command is used to compress all files in a directory in Linux?

    <p>gzip command</p> Signup and view all the answers

    What is the purpose of the userdel -r command in Linux?

    <p>Removes the home directory and its contents</p> Signup and view all the answers

    Which command is used to add members to a group in Linux?

    <p>usermod -G command</p> Signup and view all the answers

    Which command in Linux is used to set the default printer for all users?

    <p>lpoptions -d</p> Signup and view all the answers

    Which daemon in Linux logs all events and sends them to a database?

    <p>journald</p> Signup and view all the answers

    Which network construct is used by logging daemons for communication between processes?

    <p>Socket</p> Signup and view all the answers

    What is the recommended tool for restricting network service access in Linux?

    <p>TCP Wrapper</p> Signup and view all the answers

    Which command in Linux is used to save firewall rules to a file?

    <p>iptables save</p> Signup and view all the answers

    What directory typically stores log files for troubleshooting in Linux?

    <p>/var/log</p> Signup and view all the answers

    Which command is used to manage zones and firewall rules for traffic by service or port number in Linux?

    <p>firewall-cmd command</p> Signup and view all the answers

    What is the primary purpose of SELinux in Linux system security?

    <p>To enforce role-based security using security profiles and policies</p> Signup and view all the answers

    Which encryption method is commonly used in Linux for protocols like SSH and GPG?

    <p>Asymmetric encryption</p> Signup and view all the answers

    What is the potential security risk associated with SUID (Set owner User ID up on execution) in Linux?

    <p>It allows a file to be executed as the root user, potentially leading to system compromise</p> Signup and view all the answers

    Which utilities in Linux are commonly used for monitoring system performance?

    <p>sysstat package, mpstat command, iostat command</p> Signup and view all the answers

    Which tool can be used to detect intrusions in a Linux system?

    <p>Tripwire</p> Signup and view all the answers

    Study Notes

    Monitoring System Performance in Windows and Linux

    • Windows Task Manager provides a Performance tab that gives a quick view of CPU, memory, disk, and network usage.
    • The App History tab in Windows Task Manager shows usage history for Windows Store applications only, but this can be changed to show history for all processes.
    • The Startup tab in Windows Task Manager shows which programs start automatically during system log-in and allows users to disable certain programs from starting up.
    • The Users tab in Windows Task Manager shows the resources used by the user's account, other users on the system, and allows switching to other user sessions.
    • The Services tab in Windows Task Manager allows users to view and manage system programs running in the background.
    • Most Linux environments provide a system monitor, like the GNOME System Monitor, which monitors system processes, manipulates running applications, and displays resource usage history.
    • The Processes tab in the GNOME System Monitor lists all processes running on the system and provides options to control displayed processes and view dependencies.
    • The Resources tab in the GNOME System Monitor displays usage history of CPU, memory, swap memory, and network, and the File Systems tab includes information about disk space usage and file system type.
    • The ps command in Linux lists system processes, their owners, and the amount of system resources being used, and assigns a Process ID (PID) to each process.
    • The kill command in Linux is used to stop a process, with options like kill PID, kill -9 PID, and kill -SIGHUP PID, each serving different purposes.
    • Performance monitoring tools are used to collect real-time data about a system's usage activities, establish performance baselines, and investigate potential system problems and bottlenecks.
    • In Windows 10, Performance Monitor can be used to collect and view real-time data about a system's usage activities, including monitoring disk performance, managing memory, and monitoring processor use.

    Network Communication and OSI Protocol Layers

    • Network connections can be wireless (Wi-Fi, satellite, cellular) or cabled (Ethernet, phone lines, coaxial cables).
    • Wi-Fi and Ethernet are common connections for homes and offices.
    • A network adapter includes any network connector or wireless access circuitry and has a unique 48-bit MAC address.
    • MAC addresses are used to locate a computer on a local area network (LAN).
    • IP addresses are assigned to network devices when a connection is made, and MAC addresses are used in assigning IP addresses.
    • IP addresses are used to find computers on the Internet and local networks using TCP/IP protocol.
    • Port numbers uniquely identify the type of application on a computer and are added to the end of an IP address.
    • The OSI Reference Model categorizes communication into seven layers, including the Physical Layer responsible for sending bits via transmission.
    • The Data Link Layer interfaces with the physical hardware on the local network and uses MAC addresses for transmitting data.
    • The Network Layer moves messages from one node to another using IP protocol and routing protocols such as ICMP and ARP.
    • The Transport Layer is responsible for transporting application layer payloads using TCP for guaranteed delivery and UDP for fast transmission.
    • The Application Layer describes the interface between two applications, includes protocols like HTTP, SMTP, POP3, and is often intertwined with the Presentation and Session layers.

    Types of Network Connections and Hardware

    • Networks are built using various technologies with different bandwidth capacities, measured in Kbps, Mbps, Gbps, Tbps, Pbps, Ebps, Zbps, and Ybps.
    • Data throughput represents the average speed, while latency accounts for delays in network transmissions.
    • Cellular connections include 3G (200 Kbps to 4 Mbps) and 4G (100 Mbps to 1 Gbps) technologies.
    • Satellite connections, used in remote locations, offer speeds of up to 15 Mbps.
    • Telephone line connections, such as ADSL, provide speeds of 640 Kbps upstream and up to 24 Mbps downstream.
    • Cable line connections can reach speeds of up to 160 Mbps, depending on the cable type.
    • Dedicated fiber optic lines offer speeds of up to 43 Tbps.
    • Ethernet is a common LAN connection using twisted pair cabling, with Fast Ethernet at 100 Mbps and Gigabit Ethernet at 1 Gbps.
    • Wi-Fi, based on IEEE 802.11 standards, offers speeds of up to 600 Mbps for 802.11n and uses frequencies at 2.4 GHz and 5 GHz.
    • Networking hardware includes hubs that transmit data to all attached devices, switches that transmit data only to the intended device, bridges that manage traffic between segments of a network, routers that manage traffic between networks, and access points that allow wireless devices to connect to a wired network.
    • Network topologies include star, bus, and hybrid (star-bus), with most networks using a star-bus topology.
    • Each topology has its own unique arrangement of network elements and devices.

    DHCP Address Assignment Process

    • DHCP is a client/server protocol for IP address assignment.
    • The process involves a four-packet sequence: DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, and DHCPACK.
    • DHCPDISCOVER is a broadcast packet requesting an IP address from an available DHCP server.
    • DHCPOFFER is a response from the DHCP server offering an IP address and subnet mask.
    • DHCPREQUEST is the client's response to accept the offered address.
    • DHCPACK is the acknowledgment from the DHCP server, completing the transaction.
    • The lease renewal process involves a DHCPREQUEST when the lease is 50% expired and a DHCPACK from the server.
    • Common situations for lease renewal failure include server inability to honor renewal and lack of server response.
    • IPv6 provides automatic address assignment without DHCP, but DHCPv6 can still be used for address assignment and management.
    • IPv6 addresses consist of a network ID (prefix) and an interface ID.
    • IPv6 network ID can be assigned through stateless or stateful autoconfiguration or DHCPv6.
    • IPv6 interface ID can be assigned using the MAC address, randomly generated permanent or temporary identifiers, DHCPv6, or manual entry.

    Linux System Security and Performance

    • Firewall Daemon (firewalld) provides flexibility in configuring iptables through network zones and service names
    • Network Zone defines trust levels for network connections and can be mutable or immutable
    • firewall-cmd command manages zones and firewall rules for traffic by service or port number
    • SELinux enforces role-based security using security profiles and policies to prevent insecure application access
    • AppArmor provides similar protection to SELinux and can be enforced or used for warnings and log events
    • Encryption algorithms use a key to scramble data and asymmetric encryption is commonly used in Linux, such as SSH and GPG
    • Intrusions can be detected by analyzing log files, using PAM, lsof command, and detecting buffer overrun exploits
    • SUID (Set owner User ID up on execution) allows a file to be executed as the root user, potentially leading to system compromise
    • Intrusion Detection Systems (IDS) like Tripwire, AIDE, ICU, PortSentry, Snort, LIDS, and SWATCH can be used to detect intruders
    • Performance monitoring utilities like sysstat package, mpstat command, and iostat command help monitor system performance
    • The sysstat package contains utilities to monitor the system using information from the /proc directory and system devices
    • mpstat command monitors CPU performance, even for multiple processors, while iostat command measures the flow of information to and from disk devices

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of system performance monitoring in Windows and Linux with this quiz. Explore tools like Windows Task Manager and Linux system monitor, and learn about commands like ps and kill in Linux.

    More Like This

    PROG1225 Practice Quiz 2
    100 questions

    PROG1225 Practice Quiz 2

    LyricalCelebration avatar
    LyricalCelebration
    Etos First Steps 1
    5 questions

    Etos First Steps 1

    ValuableSugilite avatar
    ValuableSugilite
    Network Security and Incident Response
    48 questions
    Use Quizgecko on...
    Browser
    Browser