Section 22.9. Security (Topic 1.114)


22.9. Security (Topic 1.114)

22.9.1. Review Questions

  1. What daemon is associated with the control files /etc/hosts.allow and /etc/hosts.deny.

  2. In general terms, describe a method to locate setuid programs in the local filesystem. Why might an administrator do this routinely?

  3. What is the function of the md5sum utility?

  4. Why might a user run ssh instead of telnet?

  5. Describe shadow passwords and the file where the passwords are stored.

22.9.2. Exercises

  1. Use find as described in Chapter 21 to locate setuid files. Is the list larger than you expected? Are the entries on your list justifiably setuid programs?

  2. Use the md5sum utility on a binary program file and examine its output.



LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596005288
EAN: 2147483647
Year: 2004
Pages: 257

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net