Premium Essay

It302 Assignment 6&7

In:

Submitted By joseph81487
Words 532
Pages 3
Assignment 6.1
1. A DNS servers with preform recursive queries or an SQL server
2. An A (address) record points to a domain.
3. identifies the email servers for a domain
4. $ hostname example.com or $ dig example.com
5. etc man host.conf will tell you about the order option etc Is for static dns resolve etc the file for all your dns needs then edit:
/etc/resolv.conf
add the following: nameserver 192.168.1.254 nameserver 1.2.3.4 (Google)
6. Add the following line to the Options section in /etc/named.conf: allow-query { 137.44.0.0/24 };
7. A resolver will append several different domains to an unqualified Domain Name producing FQDNS that passes them one at a time. (Google)
8. Set up a DNS cache that defines the zone . (period) clause explicitly, rather than relying on the hint file. (www.sobell.com)
10. Setting the TTL to a small number prevents DNS caches from holding
DNS entries for very long. Small TTL values place a large load on the local
DNS server because every query about the domain is forwarded to the local server. (www.sobell.com)

Assignment 7.1
1. "hello" change and you have to edit the mail server file
2. 1. File: "df": which stores the body of the message. 2. File: "qf": which stores the headers and other information.
3. The dnl command, which stands for delete to new line, instructs the compiler to ignore anything on a line following the dnl: It is used to set off comments. (www.sobell.com)
4. # /usr/sbin/praliases | head -5postmaster: rootdaemon MORE? OR touch dd= C /sbin/var/etc/config.you (Google)
5. /etc/mail/access
6. A. HELO (Hello)
The client sends this command to the SMTP server to identify itself and initiate the SMTP conversation. The domain name or IP address of the SMTP client is usually sent as an argument together with the command (e.g. “HELO client.example.com”). If a domain name is used

Similar Documents

Premium Essay

It302 Final Exam Reveiw Answers

...IT302 Linux Administration Final Exam Revew Preparation Sheet and Study Guide 1. Which runlevel is textual multi-user mode? A. 1 B. 3 C. 5 D. 6 2. Which system script contains the default runlevel? A. /etc/default.target B. fstab.default C. profile.local D. default.runlevel Use the following information to answer Questions 3-5: A system administrator is manually setting up a new daemon named analyzed. The daemon should be set to run at runlevel 3 and be the very last daemon to load. 3. What should the link to start the daemon be named? A. skanalyzed1 B. 100analyzedstartup C. analyzedstart --last D. S99analyzed 4. Which of the following commands would stop the analyzed daemon? A. analyzed stop B. chkconfig –level 35 analyzed C. service analyzed stop D. chkconfig analyzed boot 5. Which of the following commands would tell the system at which runlevels to start analyzed? A. analyzed stop B. chkconfig –level 35 analyzed C. service analyzed stop D. chkconfig analyzed bootLinux Professor Green IT302 Linux Administration 6. Which of the following commands would let you most safely switch to runlevel 2 without rebooting the computer? A. boot 2 B. telinit 2 C. init 2 D. rl 2 7. Which type of control does SELinux implement? A. Discretionary access control B. Media access control C. Role-based access control D. Mandatory access control 8. Which of the following is not a SELinux state? A. Permissive B. Monitoring C. Enforcing D. Disabled 9. The files hosts.allow and hosts.deny belong...

Words: 1258 - Pages: 6

Premium Essay

Unit 8 It302

...Ariel Ruiz It302 Assignment 8.1 1. Which company originally created NIS under the name Yellow Pages, and then later changed the name since it was owned by “another corporation”? NIS was developed by Sun Microsystems. 2. What configuration file is used to tell Linux which system (NIS, DNS, files, etc.) to use for name resolution, authentication, etc.? The /etc/ncsd.conf configuration file is used to tell Linux which system to use for name resolution, authentication, etc. 3. The file format for an NIS database file is called a dbm. 4. Which Linux file generates two maps in NIS? The /etc/passwd file generates two maps: one indexed by username, the other indexed by UID. These maps are named passwd.byname and passwd.byuid. 5. What utility is used to display raw information from an NIS server? The ypmatch utility or ypcat utility is used to display raw information from an NIS server. 6. Which is the name of the init script for LDAP: ldap or slapd The name of the init script for LDAP is slapd. 7. What is the name for the root, or top level, entry in an LDAP directory? DSE is the root, or top level entry in an LDAP directory. 8. Expand and explain the following acronyms: a. CN = Common Name = is the attribute value used in the Relative Distinguished Name (RDN) b. DC = Domain Component = my-domain c. DN = Distinguished Name = uniquely identifies each entry in an LDAP directory. d. DSE = DSA Specific Entry = is...

Words: 319 - Pages: 2

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18