1. You have obtained a new utility, called watchit, to monitor security on your computer, and you decide to run the utility in the background. Normally, to start the utility you would enter watchit at the command line.Which of the following commands enables you to start and run this utility in the background?
b. watchit&
2. You’ve obtained over a hundred large graphics files to use in publications, but you want to be sure there is enough available disk space on your computer to store these files.Which of the following commands should you use?
a. df
3. Your company is launching a marketing campaign, and to start, you’ve created a file called promotion in normal uppercase and lowercase letters that will be used to place text for ads on
…show more content…
d. traceroute
18. Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources.Which of the following commands enables you to find the process id so you can stop that process?
a. ps
19. Which of the following commands enables you to stop the process mentioned in
Question 18?
b. kill
20. Your colleague is creating a new man page to document a manufacturing process used by your company. She wants to be able to quickly view the man page as she works on it so that she can have other people view it before copying the man page into production.Which of the following commands enables her and others to periodically review her work in a format similar to the man page format?
c. groff
21. A user on your network has received an error message that there is another computer on the same network using the same IP address, so the user cannot access the network.You send out a message to the 18 Linux users on your network to ask that they check the IP addresses on their computers and e-mail this information to you, so that you can determine who has the duplicate IP address.What utility do you tell users to run to determine their IP addresses?
a. ifconfig
22. Name two types of information that you can obtain using netstat.
(ANY two of the ones below):
Network protocol communications, network connections established by host computer, network routing information, information about computers
In order to minimize the likelihood of the second case to occur I would make sure the external firewall settings block incoming traffic
Refering to figure 1 below: You are the network administrator for the network depicted in the diagram.
If user name or password is incorrect the system will show a message “User name or password is incorrect” .
55. Can you confirm that all computers used to administer servers conform to the requirements for RIT-owned or leased computers as stated in the Desktop and Portable Computer Security Standard. (5.12.1)
Performance of the network might be slow as other users are also using the same network. It also depends on how many computers are connected with the network.
What role enables users working at another computer on the company network, or on the internet, to establish a connection to a server and open an application or desktop session there?
IP stands for ‘Internet Protocol’ and is made of numbers and periods. It is the
21. Your international company is scheduling a meeting among managers in Canada, the United States, Spain, Sweden, and Hong Kong on the basis of Greenwich Mean Time (GMT). What command enables you to display the current time in GMT?
Click Local Server in left pane and then click the Computer Name link. The System Properties sheet appears.
You can download many utilities from the Internet. Examples of utilities are cp (copies a file), ls (lists information about files), ssh (securely connects to a remote computer), and df (lists information about free space on system devices such as hard disks).
His computer is plugged into jack C39, which is connected to port 41 on switch 2960-48-5EAST01 (192.168.11.12).
“New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.”
Ensure the User Account Control (UAC) is enabled on the computers. This will help with the following security threats: malware.
Linux is a trademark owned by Linus Torvalds [1]. It is an operating system which is powerful, free and inexpensive to own based on UNIX [1]. It is a POSIX-compliant with versions available to install in cell phones, supercomputers and most computing systems [1]. Linux is an open source program as its source code is available to the general public for use and the right to modify from its original design without any charges [1]. New code will be added to the next version made available with Linux if it is accepted as a universal improvement [1]. The code will continue to exist and developed by the user even if the company fails [1]. Moreover, updates for Linux are available every six months [1]. Nowadays, Linux is in constant development by