click below
click below
Normal Size Small Size show me how
NOS220 Review (Ch14)
Linux Study Guide - Troubleshooting, Performance, & Security
Question | Answer |
---|---|
etc/ld.so.cache | The file that contains the location of shared library files. |
/etc/ld.so.conf | The file that contains a list of directories that contain shared libraries. |
assistive technologies | Software programs that cater to specific user needs. |
asymmetric encryption | A type of encryption that uses a key pair to encrypt and decrypt data. |
baseline | A measure of normal system activity. |
BBC Linux | A small CD/DVD-based Linux distribution. |
buffer overrun | An attack in which a network service is altered in memory. |
bus mastering | The process by which peripheral components perform tasks normally executed by the CPU. |
chains | The components of a firewall that specify the general type of network traffic to which rules apply. |
digital signature | Information that has been encrypted using a private key. |
Digital Signature Algorithm (DSA) | A common asymmetric encryption algorithm that is primarily used for creating digital signatures. |
documentation | The system information that is stored in a log book for future reference. |
file handles | The connections that a program makes to files on a filesystem. |
free command | A command used to display memory and swap statistics. |
gpg command | A command used to create and manage GPG keys. |
GNU Privacy Guard (GPG) | An open source asymmetric encryption technology that is primarily used by e-mail programs. |
Intrusion Detection System (IDS) | A program that can be used to detect unauthorized access to a Linux system. |
iostat (input/output statistics) command | A command that displays input/output statistics for block devices. |
iptables command | The command used to configure a firewall in Fedora Linux. |
jabbering | The process by which failing hardware components send large amounts of information to the CPU. |
key | A unique piece of information that is used within an encryption algorithm. |
Knoppix Linux | A CD/DVD-based Linux distribution. |
ldconfig command | The command that updates the /etc/ld.so.conf and /etc/ld.so.cache files. |
ldd command | The command used to display the shared libraries used by a certain program. |
logger command | A command that can be used to write system log events via the System Log Daemon (rsyslogd). |
lsof (list open files) command | The command that lists the files that are currently being viewed or modified by software programs and users. |
lspci command | The command that lists the hardware devices that are currently attached to the PCI bus on the system. |
lsusb command | The command that lists the USB devices that are currently plugged into the system. |
monitoring | The process by which system areas are observed for problems or irregularities. |
mpstat (multiple processor statistics) command | A command that displays CPU statistics. |
netfilter/iptables | The Linux kernel components and related software subsystem that provide firewall and NAT capability on modern Linux systems. |
nmap (network mapper) command | A command that can be used to scan ports on network computers. |
nohup command | A command that prevents other commands from exiting when the parent process is killed. |
Orca | A Linux software program that provides several assistive technologies to desktop environment users. |
Pluggable Authentication Modules (PAM) | The component that handles authentication requests by daemons on a Linux system. |
private key | An asymmetric encryption key that is used to decrypt data and create digital signatures. |
proactive maintenance | The measures taken to reduce future system problems. |
public key | An asymmetric encryption key that is used to encrypt data and decrypt digital signatures. |
reactive maintenance | The measures taken when system problems arise. |
Rivest Shamir Adleman (RSA) | A common asymmetric encryption algorithm. |
rules | The components of a firewall that match specific network traffic that is to be allowed or dropped. |
sar (system activity reporter) command | The command that displays various system statistics. |
Security Enhanced Linux (SELinux) | A set of Linux kernel components and related software packages that prevent malicious software from executing on a Linux system. |
server closet | A secured room that stores servers within an organization. |
sestatus command | The command that displays the current status and functionality of the SELinux subsystem. |
ssh-add command | The command that users can use to add an SSH identity to their user account. |
SSH agent | A software program that can be used to automatically authenticate users using their private key. |
SSH identity | A unique configuration for a user account that is associated with user-specific SSH keys. |
stateful packet filter | A packet filter that applies rules to related packets within the same network session. |
su (switch user) command | A command that can be used to switch your current user account to another. |
sudo command | A command that is used to perform commands as another user via entries in the /etc/sudoers file. |
System Statistics (sysstat) package | A software package that contains common performance monitoring utilities, such as mpstat, iostat, and sar. |
TCP wrapper | A program that can be used to run a network daemon with additional security via the /etc/hosts.allow and /etc/hosts.deny files. |
tripwire | A common IDS for Linux that monitors files and directories. |
troubleshooting procedures | The tasks performed when solving system problems. |
tunneling | The process of embedding network packets within other network packets. |
ulimit command | The command used to modify process limit parameters in the current shell. |
vmstat command | The command used to display memory, CPU, and swap statistics. |