click below
click below
Normal Size Small Size show me how
NOS220 Review (Ch14)
Linux Study Guide - Troubleshooting, Performance, & Security
| Question | Answer |
|---|---|
| etc/ld.so.cache | The file that contains the location of shared library files. |
| /etc/ld.so.conf | The file that contains a list of directories that contain shared libraries. |
| assistive technologies | Software programs that cater to specific user needs. |
| asymmetric encryption | A type of encryption that uses a key pair to encrypt and decrypt data. |
| baseline | A measure of normal system activity. |
| BBC Linux | A small CD/DVD-based Linux distribution. |
| buffer overrun | An attack in which a network service is altered in memory. |
| bus mastering | The process by which peripheral components perform tasks normally executed by the CPU. |
| chains | The components of a firewall that specify the general type of network traffic to which rules apply. |
| digital signature | Information that has been encrypted using a private key. |
| Digital Signature Algorithm (DSA) | A common asymmetric encryption algorithm that is primarily used for creating digital signatures. |
| documentation | The system information that is stored in a log book for future reference. |
| file handles | The connections that a program makes to files on a filesystem. |
| free command | A command used to display memory and swap statistics. |
| gpg command | A command used to create and manage GPG keys. |
| GNU Privacy Guard (GPG) | An open source asymmetric encryption technology that is primarily used by e-mail programs. |
| Intrusion Detection System (IDS) | A program that can be used to detect unauthorized access to a Linux system. |
| iostat (input/output statistics) command | A command that displays input/output statistics for block devices. |
| iptables command | The command used to configure a firewall in Fedora Linux. |
| jabbering | The process by which failing hardware components send large amounts of information to the CPU. |
| key | A unique piece of information that is used within an encryption algorithm. |
| Knoppix Linux | A CD/DVD-based Linux distribution. |
| ldconfig command | The command that updates the /etc/ld.so.conf and /etc/ld.so.cache files. |
| ldd command | The command used to display the shared libraries used by a certain program. |
| logger command | A command that can be used to write system log events via the System Log Daemon (rsyslogd). |
| lsof (list open files) command | The command that lists the files that are currently being viewed or modified by software programs and users. |
| lspci command | The command that lists the hardware devices that are currently attached to the PCI bus on the system. |
| lsusb command | The command that lists the USB devices that are currently plugged into the system. |
| monitoring | The process by which system areas are observed for problems or irregularities. |
| mpstat (multiple processor statistics) command | A command that displays CPU statistics. |
| netfilter/iptables | The Linux kernel components and related software subsystem that provide firewall and NAT capability on modern Linux systems. |
| nmap (network mapper) command | A command that can be used to scan ports on network computers. |
| nohup command | A command that prevents other commands from exiting when the parent process is killed. |
| Orca | A Linux software program that provides several assistive technologies to desktop environment users. |
| Pluggable Authentication Modules (PAM) | The component that handles authentication requests by daemons on a Linux system. |
| private key | An asymmetric encryption key that is used to decrypt data and create digital signatures. |
| proactive maintenance | The measures taken to reduce future system problems. |
| public key | An asymmetric encryption key that is used to encrypt data and decrypt digital signatures. |
| reactive maintenance | The measures taken when system problems arise. |
| Rivest Shamir Adleman (RSA) | A common asymmetric encryption algorithm. |
| rules | The components of a firewall that match specific network traffic that is to be allowed or dropped. |
| sar (system activity reporter) command | The command that displays various system statistics. |
| Security Enhanced Linux (SELinux) | A set of Linux kernel components and related software packages that prevent malicious software from executing on a Linux system. |
| server closet | A secured room that stores servers within an organization. |
| sestatus command | The command that displays the current status and functionality of the SELinux subsystem. |
| ssh-add command | The command that users can use to add an SSH identity to their user account. |
| SSH agent | A software program that can be used to automatically authenticate users using their private key. |
| SSH identity | A unique configuration for a user account that is associated with user-specific SSH keys. |
| stateful packet filter | A packet filter that applies rules to related packets within the same network session. |
| su (switch user) command | A command that can be used to switch your current user account to another. |
| sudo command | A command that is used to perform commands as another user via entries in the /etc/sudoers file. |
| System Statistics (sysstat) package | A software package that contains common performance monitoring utilities, such as mpstat, iostat, and sar. |
| TCP wrapper | A program that can be used to run a network daemon with additional security via the /etc/hosts.allow and /etc/hosts.deny files. |
| tripwire | A common IDS for Linux that monitors files and directories. |
| troubleshooting procedures | The tasks performed when solving system problems. |
| tunneling | The process of embedding network packets within other network packets. |
| ulimit command | The command used to modify process limit parameters in the current shell. |
| vmstat command | The command used to display memory, CPU, and swap statistics. |