Exam 14: Troubleshooting, Performance, and Security
A(n) ____ is a program that can start a network daemon.
B
What methods can be used to physically secure local computers?
One of the most important security-related practices is to limit access to the physical Linux computer itself. If a malicious user has access to the Linux computer, that user could boot the computer using a floppy disk, USB flash drive, CD, or DVD that contains a small operating system and use it to access files on the partitions on the hard disk of the Linux computer without having to log in to the operating system installed on the hard disk. To prevent this, you should lock important computers, such as Linux servers, in a specific room to which only Linux administrators or trusted users have key access. This room is commonly called a server closet. Unfortunately, some Linux computers, such as Linux workstations, must be located in public areas. For these computers, you should remove the floppy, CD, and DVD drives from the computer. In addition, you should ensure that the boot order listed in the computer BIOS prevents booting from the USB ports, as well as ensure that a system BIOS password is set to prevent other users from changing the boot order.
Another important security consideration for Linux computers is to limit access to graphical desktops and shells. If you walk away from your workstation for a few minutes and leave yourself logged in to the system, another person can use your computer while you are away. To avoid such security breaches, it is good security practice to lock your desktop environment or exit your command-line shell before leaving the computer.
Both the GNOME and KDE desktop environments allow you to lock your screen. For the GNOME desktop, you can click the System menu and choose Lock Screen. To use your desktop again, you need to enter your password.
Match each term with the correct statement below.
-The measures taken when system problems arise.
H
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
For the GRUB boot loader, errors are typically the result of a missing file in the /boot directory. _________________________
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.
Match each term with the correct statement below.
-A utility that can be used to indicate whether more physical memory is required.
Match each term with the correct statement below.
-A tool used by network applications that authenticate users.
The ____ command can be used to obtain root access when you need to perform an administrative task.
Viewing the output of the ____________________ command or the contents of the /var/log/boot.log and /var/log/messages log files can isolate most hardware problems.
Match each term with the correct statement below.
-The file that contains a list of directories that contain shared libraries.
In SSH, the /etc/ssh directory stores the DSA public key in the ____ file.
How can you identify filesystem corruption? How should you troubleshoot filesystem corruption on a non-critical partition?
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
Match each term with the correct statement below.
-The measures taken to reduce future system problems.
How is the mpstat utility used? What information does it provide, and how can that information be interpreted?
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
Match each term with the correct statement below.
-A command that gives users the ability to run certain commands as the root user.
The shell restricts the number of file handles that programs can open to ____ by default.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)