Skip to main content

Explain the tools used to monitor system security.

12.Explain the tools used to monitor system security.
Ans.
1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’.

2. If there is a vulnerability in a system they will find it and use it against you.

3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone.

4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds.

5. You need to configure those tools and understand how to sense the warning they provide.

6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system.

7. Red hat is careful enough to making available new, patched version in which potential exploits have been found.

8. You should make sure to download and install the repaired package.

9. This line of defence can be annoying but it is nothing compared to rebuilding a compromised system.

Comments

Popular posts from this blog

Explain memory and virtual file system in Linux.

22.Explain memory and virtual file system in Linux. Ans. 1. These file systems do not exist on disk in the same way that traditional file systems do, they either exists entirely in the system memory or they are virtual because they are an interface to system devices. 2. cramfs: cramfs is designed to cram a file System onto a small flash memory device, so it is small, simple and able to compress things well. The largest file size is 16MB and the largest file system size is 256MB since cramfs is so compressed, it isn’t instantly updateable. 3. tmpfs: tmpfs is structured around the idea that whatever is put in the /tmp file system is accessed again shortly, tmpfs solely in memory, so what you put in /tmp doesn’t persist between reboots. 4. ramfs: ramfs is basically cramfs without the compression. 5. romfs: This is a read only file system that is mostly used for initial ramdisks of installation disks. It was designed to take up very little space, so you could fit a ke...

Explain how to configure DHCP client?

50.Explain how to configure DHCP client? Ans. 1. Before configuring DHCP, NIC should be configured properly and recognized by the system. 2. After that it’s easy to command system to use DHCP to obtain its IP information. 3. Configuring DHCP client involves following steps : a. Open the /etc/sysconfig/networkscripts/ifcfg-eth0 file. b. Find the line bootproto=static c. Change the static to dhcp. d. Save changes. e. Restart the network by issuing command ‘service network restart’, after that system will receive its IP information from the DHCP server.