Sunday, April 26, 2009

Chapter 12 Case Project

1.) For the smaller office of the firm I would recommend using a /etc/hosts file versus a DNS server. Because of the large spread out nature of the firm I would use the DNS overall because it would be easier to maintain that one server instead of having to maintain the /etc/hosts files in each of the buildings. It would also be cheaper this way because the DNS server would be centrally located.

2.) In order to properly maintain static IP addresses you have to have a skilled network administrator that is able to account for variable change, so I would recommend using DHCP servers in each of the offices. This would eliminate most of the chances for human error with the IP addressing, and ease some of the burdon off of the administrator. While there is still work in maintaining the DHCP servers it is negligible compared to the cost of having to track down a faulty IP address.

3.) I would go with the Konica Minolta bizhub c550 for the firms printing needs. It offers a wide range of features, has superior quality printing, and comes from a trusted name in Minolta. This model is designed for business, and has an easy to use touch screen. It is perfectly rated to be used on Linux operating systems, and you are able to get support directly from the Konica Minolta site. Running a search engine on the web also brings up many support sites with places to buy repair parts and toner.

Saturday, April 18, 2009

Password Proposal

From the desk of Christopher M. Edwards

Memorandum 11.2

Password Security


Members of the board:

As you are all aware, last week we had a major security breach into our company. After looking into it further we have discovered that the breach was caused by an employee that had used her daughter's birth date as her password. In Memorandum 11.1 I had warned against using such passwords because they are among the easiest to hack. Anyone that has access to personal information can use methods of deduction to decipher common passwords such as birth dates, hobbies, or anniversaries. It is in my professional opinion that we need to take further steps to prevent future breaches into our company.

By changing certain features that are stored in the password protection files we can make it to where passwords have to meet certain parameters in order to be used. If these changes are implemented we can require passwords to be at least certain length, that they are not words found in a dictionary, and that they have a variety of lowercase, uppercase, symbols and numbers.

Other features can be altered to change how long the password is good for. This makes sure that an employee is changing their password often enough that if someone does hack into the system using a known password, that password is only good for so long before it must be changed again. We can also make it to where you can not use the same password within a certain time period. If you have used the password within a given number of changes you will not be able to use it again until a sufficient period of time has elapsed.

If we make these changes it will go a long way towards maintaining our companies internal and external security, as well as giving piece of mind to everyone that our information is secure.

Thank you,

Christopher M. Edwards
Network Manager

Saturday, April 11, 2009

Chapter 10 Review Questions

1.) Name the two widely used software package formats for Linux, with the file system extensions used for each type and the command-line utility use to manage each.

The Red Hat Package Manger uses the .tgz file extension and the rpm command-line utility. The Debian package format uses the .deb file extension and the dpkg command-line utility.

2.) Within the system-config-packages utility, selecting details and checking a package name:

Marks the package as one that will be installed after the Update button is selected after other categories of packages have also been reviewed for possible changes.

3.) Which option of the rpm command is used to verify the cryptographic signature so you know for certain the person or organization that created a given rpm file?

--checksig or -K

4.) If you know the name of a package, you can see a list of all the files contained in that package using this command:

rpm -ql packagename

5.) If you have an rpm-format file stored on your system, and then you use the rpm command to install that software package, the rpm file will no longer be on your system. True or False?

False

6.) When querying an installed package using the -q option, you use ______; when installing an rpm file using the -U option you use ______:

The name of the package alone; the complete file name with all version numbers and file extensions.

7.) The command rpm -q packagename does the following:

Determines whether packagename is installed on the system.

8.) The volume label for a file system is:

Stored in /etc/fstab

9.) Defragmentation, the process of collecting all parts of a file into one contiguous part of a hard disk:

Is not needed in Linux because of the way ext2, ext3, and other Linux file systems arrange files.

10.) The Linux kernel is able to support multiple file system types because it uses:

A virtual file system that separates standard disk operations from the drivers that perform those operations.

11.) Which piece of information is not provided in the output when the mount command is entered with no parameters or options?

The size of each mounted file system

12.) Which of the following lists contains only commands used to learn about the status of file systems?

df, du, fsck, tune2fs, mount

13.) The ______ command is used to display the attributes assigned to a file or directory?

lsattr

14. Name two attributes that are currently supported by the ext3 file system and tow attributes that are not yet supported or are used only for developers at this time.

A, and a are currently supported. X and Z are used by developers.

15.) The Linux command used to format a Linux ext3 hard disk partition is:

mke2fs

16.) Disk quotas let you manage how much disk space a user consumes, but they must be first enabled:

On the file system where you want the quota to apply (in /etc/fstab)

17.) A mounted file system is defines as one that:

Has been included as part of the Linux directory structure.

18.) The fdisk utility is used to:

establish partitions of the correct type to hold a Linux file system.

19.) The df utility provides information about which one of the following?

File system capacity, device name, and percentage used status for each mounted file system.

20.) Describe the effect of the defaults option in a configuration line of the /etc/fstab file.

Defaults includes the following options in the configuration automatically: rw, suid, dev, exec, auto, nouser, and async.

21.) Describe the main advantage of having swap space located on a hard disk separate from the Linux data partitions.

It allows both hard drives to work at the same time and increases system performance.

22.) If you attempt to unmount a mounted file system and receive an error message, the most likely cause is:

One or more users are working in the file system.

23.) The autofs service is used to:

Permit users to access file systems that are not mounted by automatically mounting them when the user enters a configured directory (mount point).

24.) Virtual memory space to be used by the kernel must be located on a single separate partition, which can be located on the same hard disk or a different hard disk from the root file system. True of False?

False

25.) Which command is used to establish a quota for a user when disk space quotas have been enabled for a file system?

edquota

Friday, April 3, 2009

Chapter 9 Review Questions

1.) Which of the following occurs first when a computer is booted?

The CPU starts executing commands found in the BIOS.

2.) On new computers, the BIOS can typically boot from which of the following devices?

Hard disks, CD-ROM drives, removable disks, a network connection, or USB devices.

3.) When using LILO rather than GRUB, you must do which of the following after making a configuration change in order for the change to be effective the next time you boot Linux?

Run the lilo command as root.

4.) Assuming a standard configuration, the BIOS looks first in which of the following locations on a hard disk when trying to find a boot loader or operating system?

The boot record of the active partition on the first IDE hard disk.

5.) In order to use chained boot loaders, you must be certain that:

The first boot loader can be found by the BIOS, and each operating system can be reached via one of the chained boot loaders.

6.) The Linux kernel is a file having a name that starts with _____ and typically stored in the ______ subdirectory.

vmlinuz, /boot

7.) Which feature is part of GRUB but not LILO?

Including non-Linux operating systems in the list of bootable devices.

8.) Describe the output of the uname command.

It just says Linux, but if you add different designators to the command you can change the output.

9.) The GRUB boot manager can be reconfigured directly as you boot your system, but is also controlled by this configuration file:

/boot/grub/grub.conf

10.) Which of the following statements about boot parameters is accurate?

They are passed to the Linux kernel by the boot loader.

11.) The scripts in /etc/rc.d/init.d are provided by:

The software package that installs the service that the script controls.

12.) Explain the difference between the configuration data stored in files within the /etc/sysconfig directory and service-specific configuration data stored in other subdirectories of /etc.

You can edit the /etc/sysconfig files directly, where as if you use the service-specific configuration files the alterations you make there make the changes themselves.

13.) The ______ utility displays kernel hardware configuration messages from the system boot process.

dmesg

14.) The init program relies on the following configuration file:

/etc/inittab

15.) Name the two run levels normally used to run a Linux-based computer, and describe the difference between the two run levels.

Level 3 which has a non-graphical login, and level 5 which has a graphical login.

16.) The files in /etc/rc.d/init.d can be used to:

Stop and restart most standard services in Linux.

17.) Name three commands that can be used to begin a graceful shutdown of Linux.

reboot, halt, and shutdown

18.) A boot loader can be configured to boot multiple Linux kernel that use the same partition as their root file system. True or False?

False

19.) The timeout= parameter in a GRUB configuration and the delay=parameter in a LILO configuration both refer to:

How long the boot loader waits for user input before booting the default operating system.

20.) The service command is used to:

View or change the current status of a service via a script in /etc/rc.d/init.d

21.) The chkconfig command is used to:

Change the boot-up status of a service that is controlled via a script located in /etc/rc.d/init.d

22.) Name the graphical configuration utility provided with Red Hat Linux and Fedora that can be used in place of the command-line utilities service and chkconfig.

The Service Configuration utility.

23.) If a journaling file system prevents partially written information from causing a corrupted file system in Linux, why is it still important to use graceful shutdown techniques rather than just turning off the system power?

Because you can still lose important data that has not yet been written to the disk. If you do a graceful shutdown it gives the system a chance to write the data.

24.) Which command is typically executed when the Ctrl+Alt+Del key combination is pressed, and where is that command configured?

It is a shutdown command that automatically restarts the system. It is configured in the /etc/inittab file.

25.) What is the command you use to cause the init program to reread its configuration file after you have made changes to it?

telinit