Nt1430 Unit 2 Lab Procedure

In: Computers and Technology

Submitted By mrporter86
Words 1532
Pages 7
Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux

Required Resources
Access to the Internet
Access to ITT Tech Virtual Library
Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource.

(cont’d)

Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read the man page on man.

-------------------------------------------------
[fred@localhost ~]$ man man Press Space or Page Down to page forward, Page Up to page backward, and q to quit.

3. Then read the man page for each of these commands: a. b. bash c. whoami d. pwd e. cd f. ls g.…...

Similar Documents

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Biology Lab Unit 2

...Name: Date: October 18, 2013 Instructor’s Name: Assignment: SCIE207 Phase 2 Lab Report Title: Animal and Plant Cell Structures Instructions: Your lab report will consist of the completed tables. Label each structure of the plant and animal cell with its description and function in the tables provided. When your lab report is complete, post it in Submitted Assignment files. 1. Animal Cell: Observe the diagram showing the components of an animal cell. Using the textbook and virtual library resources, fill in the following table: Animal Cell |Number |Cell Structure |Description and Function | |1 |Nuclear pore  |Microscopic channels that allow certain material in | | | |and out of the nucleus | |2 |Chromatin (DNA)  |Made up of DNA and protein, packages DNA into smaller| | | |volume to fit in the cell and serves as a mechanism | | | |to control expression and DNA replication | |3 |Nucleus  ......

Words: 606 - Pages: 3

Unit 2 Lab

...Unit 2 Lab The five characteristics of cloud computing as defined by the NIST is as follows, on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. On demand self-service is defined as a service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they’re required. Broad network access is defined as a private cloud network operated within a company’s firewall that are available for access from a wide range of devices such as tablets, PC’s, Mac’s and smartphones. These resources are accessible from a wide range of locations that offer online access. Resource pooling is defined as a situation in which providers serve multiple clients, and customers with provisional and scalable services. These services can be adjusted to suit each client’s needs without any changes being apparent to the client or end user. Rapid elasticity is defined as the ability to provide scalable services. Measured service is defined as aspects of cloud service that are controlled and monitored by the cloud provider. Rackspace offers many options for cloud computing. You can build your own account which you would manage or you can get one for a flat fee an account that Rackspace will manage for you. Services offered by Rackspace are cloud servers, cloud backup, cloud files, cloud load balancers, could database, cloud monitoring, cloud block storage, and cloud bandwidth. Rackspace also offers services...

Words: 260 - Pages: 2

Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk,......

Words: 450 - Pages: 2

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Nt1430 Unit 2 Discuss

...The Second Extended File System (EXT2) file system is a replacement of the Extended File System (EXT). The file system was created by Rémy Card in 1993. EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles. The Filesystem Hierarchy Standard (FHS) is a reference describing the conventions used for the layout of a UNIX system. It has been made popular by its use in Linux distributions, but it is used by other UNIX variants as well. The Linux Standard Base (LSB) refers to it as a standard. In the FHS all files and directories appear under the root directory "/", even if they are stored on different physical or virtual devices. Note however that some of these directories may or may not be present on a Unix system depending on whether certain subsystems, such as the X Window System, are installed. The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux......

Words: 421 - Pages: 2

Nt1430 Unit 2 Assignment 1

...system. What error message do you get? What happens when you attempt to create a symbolic link to the file instead? * 6. You should have read permissions for the /etc/passwd file. To answer the following questions, use car or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? * You can use the colon : b. How many fields are used to describe each user? * There are 7 fields that are used to describe each other. c. How many users are on the local system? * There are 4 to 5. d. How many different login shells are in use on your system? (Hint: look at the last field.) * There are 2 login shells that are in use in my system....

Words: 557 - Pages: 3

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Unit 2 Labs

...Lab 2.3 Exercise 2.3.1 LAN Local Area Network is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building using network media. MAN Metropolitan Area network is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. PAN personal area network is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. WAN A wide area network (WAN) is a computer network that spans a relatively large geographical area and consists of two or more interconnected local area networks (LANs). The classification metric used here Exercise 2.3.2 Network Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network, and may be depicted physically or logically. The metric used to define networks by topology is what clients they are using and how they are using them. A wide area network is larger than a metropolitan network for example. Exercise 2.3.3 It would take 1 hop to send a message from A to B. To get from B to A it would take 3 hops to send a message. It would take one link to connect E to D and C. It would add one message to the transverse of the ring. Exercise 2.3.4 It......

Words: 633 - Pages: 3

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Unit 2 Lab 2: Self - Control

...Jaime H. Cabigtnig Unit 2 Lab 2: Self - Control TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?| Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family| Cursing|Donate $2 to charity|Reward myself with a positive word for today| Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers | Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally| Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight| Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.| Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions| Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’......

Words: 352 - Pages: 2

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (http://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Nt1430 Unit 3 Lab

...Wanda Gonzalez Thursday 10/16/14 GS1145 Unit 5 My name is Wanda and the five words that I have chosen are Respect, Responsibility, Dependability, Attitude, and Discipline. Dependability means reliable, worthy of trust, and that you can be counted on no matter what. When I say that I am going to do something you can consider it done. My friends and family know that they can depend on me .Responsibility means to be accountable for something within my power. When I was in the military I was in charge of a number of soldiers. It was my job to keep them as safe as possible and assure that they had what they needed to get the job done. I was taught to pay my debts no matter how long it takes. Attitude is a feeling in regards to a person or thing. Thanks to my time in the military I was taught to have a positive can do attitude. All through my life I have always had a matter of fact attitude, tell it like it is whether you like it or not. Discipline is training to act in accordance with rules; drill. In basic training we did the same drills over and over again till we were proficient at it. I was always very disciplined in carrying out my job and my orders. Respect is esteem for a sense of the worth or excellence of a person. I was raised by my grandmother and she taught me respect;” yes mam, no mam” and if we didn’t she would not hesitate to smack me. I have high regards for people in authority such as law enforcement, Commander......

Words: 424 - Pages: 2

Unit 2 Lab

...ALPHA JALLOH Unit 4. Exercise1. Cabling –Definitions HORIZONTAL CABLE -The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring. BACKBONE CABLE A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. This cable can service voice communications or data communications. In star-topology data networks, the backbone cable interconnects hubs and similar devices, as opposed to cables running between hub and station. In a bus topology data network, it is the bus cable. Backbone is also called riser cable, vertical cable, or trunk cable. PATCH CORDS Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run; also called. Used for interconnecting circuits on a patch panel or cross-connect. Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long. CONNECTORS -With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers together to provide a means for attaching and......

Words: 1109 - Pages: 5

Unit 2 Lab Cobit Framework

...Erica Callahan IS3110 Risk Mgmt. IT Unit 2 Lab CORBIT Framework 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factors Definitions for Vulnerabilities) a. Denial of Service attack of organized e-mail server Nessus: High b. Loss of Production Data Nessus: Medium c. Unauthorized access to organization owned Workstation Nessus: High d. Workstation browser has software vulnerability Nessus: Low e. User downloads an unknown e-mail attachment Nessus: Low 2. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factors Definitions for Vulnerabilities) f. Denial of Service attack of organized e-mail server Nessus: High g. Loss of Production Data Nessus: Medium h. Unauthorized access to organization owned Workstation Nessus: High i. Workstation browser has software vulnerability Nessus: Low j. User downloads an unknown e-mail attachment Nessus: Low 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No more than 5), Specify whether the threats or vulnerability impacts confidentiality – integrity – availability: a. Denial of Service attack of organized e-mail server – Integrity, Availability b. Loss of Production Data – Confidentiality, availability c. Unauthorized access......

Words: 977 - Pages: 4