Premium Essay

Nt1430 Unit 2 Lab Procedure

In: Computers and Technology

Submitted By mrporter86
Words 1532
Pages 7
Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux

Required Resources
Access to the Internet
Access to ITT Tech Virtual Library
Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource.


Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read the man page on man.

[fred@localhost ~]$ man man Press Space or Page Down to page forward, Page Up to page backward, and q to quit.

3. Then read the man page for each of these commands: a. b. bash c. whoami d. pwd e. cd f. ls g.…...

Similar Documents

Premium Essay

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Premium Essay

Unit 2 Lab

...Unit 2 Lab The five characteristics of cloud computing as defined by the NIST is as follows, on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. On demand self-service is defined as a service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they’re required. Broad network access is defined as a private cloud network operated within a company’s firewall that are available for access from a wide range of devices such as tablets, PC’s, Mac’s and smartphones. These resources are accessible from a wide range of locations that offer online access. Resource pooling is defined as a situation in which providers serve multiple clients, and customers with provisional and scalable services. These services can be adjusted to suit each client’s needs without any changes being apparent to the client or end user. Rapid elasticity is defined as the ability to provide scalable services. Measured service is defined as aspects of cloud service that are controlled and monitored by the cloud provider. Rackspace offers many options for cloud computing. You can build your own account which you would manage or you can get one for a flat fee an account that Rackspace will manage for you. Services offered by Rackspace are cloud servers, cloud backup, cloud files, cloud load balancers, could database, cloud monitoring, cloud block storage, and cloud bandwidth. Rackspace also offers services...

Words: 260 - Pages: 2

Free Essay

Nt1430 Unit 1

...Unit 1 Assignment 1 * Chap. 1 1.) What is Free Software? a. Here are three characteristics of free software. * The freedom to run the program, for any purpose (freedom 0) * The freedom to redistribute copies so you can help your neighbor (freedom 2) * The freedom to study how the program works, and adapt it to your needs (freedom 1) 4.) What are the Free Software Foundation/ GNU? What is Linux? What else has helped refine this OS? a. The (FSF) is a 501 non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to create, distribute and modify computer software, with the organization's preference for software being distributed under copy left. b. Linux is an open-source operating system modeled on UNIX c. Thousands of people helped refine the operating system online. * Chap. 2 1.) What does the process of installing an OS like Fedora involve? a. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible. * Chap. 3 1.) What is a live system? What advantages does it have over an installed system? a. A live system gives you a chance to preview Fedora without installing it. It does not write to hard......

Words: 527 - Pages: 3

Premium Essay

Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk,......

Words: 450 - Pages: 2

Premium Essay

Unit 2 Lab Align Auditing Frameworks for a Business Unit with in the Dod

...use. b. DIACAP points to DoDD 8500.2, making it clear where to start identifying the IA capabilities that should be included and assessed for a particular C&A effort. c. One of the biggest complaints about DITSCAP was that it required too much documentation and took too long to perform. d. DIACAP identifies four spreadsheets that summarize important C&A information. e. A second complaint about DITSCAP was that it only accommodated individual systems. f. DIACAP addresses the need to expand C&A to account for components outside of a site’s control. 2. What is DCID 6/3, and why would you use DCID 6/3 as opposed to DIACAP for Certification and Accreditation of a system? g. It is the policy for “Protecting Sensitive Compartmented Information Within Information Systems”. This directive establishes the security policy and procedures for storing, processing, and communicating classified intelligence information in information systems (ISs). For purposes of this Directive, intelligence information refers to Sensitive Compartmented Information and special access programs for intelligence under the purview of the DCI. An information system is any telecommunications and/or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of voice and/or data (digital or......

Words: 1031 - Pages: 5

Free Essay

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Free Essay

Nt1430 Unit 1 Excercises

...Unit 1 Exercises Chapter 1. 1. Free software is user can uses software at no charge. The characteristics of free software are no cost, full version, no expiration. 4. Free software Foundation/GNU is free to redistribute, modify, and study it. Linux is operating system developed through the cooperation of numerous people around the world, is product of the internet and is a free operating system. Linux provides UNIX and GNU. Linus Torvalds helps refine Linux system. Chapter 2. 1. The process installing Fedora/RHEL: a. Make sure the BIOS is set to boot from DVD drive. b. Check installation medium. c. Creates RAM disk uses in place of the hard disk. d. Configure system. e. Writes the operating system files to the hard disk. f. Completing installation on boot up. g. Ready to use. Chapter 3. 1. Live system can run on computer without installing Linux on the computer. Live system does not require installation and hard drive. 4. The /boot partition should be on first partition on hard drive. 8. Fedora system start X by default when enters runlevel 5 (graphical environment). Chapter 11. 1. Single-user mode has only the system console is enabled. Multi-user mode has all appropriate file systems are mounted, users can log in from all connected terminals, dial-up lines, and network connections. 3 The su command, also referred to as substitute user, super user, or switch user, allows a computer operator to change the current user account associated with the......

Words: 328 - Pages: 2

Free Essay

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Free Essay

Unit 3 Lab 2 Integrity Matters

...for an important job or project and go to lunch; you take longer and longer breaks/lunches because no one pays attention to you. The next day you repeat the same process take a longer lunch and your project manager receives an email from the director that he’s been noticing his employee leave on break or lunch and he’s been missing in action for a while then he explains that there has been an emergency concerning the project and needs it to be fixed immediately. Your employee who’s been taking longer lunches is the lead head for the project, the first person the project manager looks for is you, but you are on a 1 hour and 30 min lunch and were noticed finally by your project manager. This lack of responsibility just cost you your job. 2. There is an important meeting at 8:00am in the morning; this meeting is to discuss some new protocols for work. You never were late every day to work, but this day you decide to come to work late and end up walking into the meeting that is being held by the GM. Bad first impression. 3. The client asked for you to work on a project that had a deadline. You noticed that you weren’t actually finished when you said you were, and now you had to hire someone else to take on the task. This mistake has cost you your contract, and messed up your reputation. 4. You are in the lunch room eating lunch, while you’re eating lunch you do not know that your boss’s daughter is actually in the lunch room visiting her dad for the day. You’re......

Words: 427 - Pages: 2

Free Essay

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Free Essay

Nt 1430 Unit 7 Lab 2 Chap 25

...expired, or the network connection was broken. /usr/share/system-config-firewall/ GtkWarning: Attempting to store changes into `/root/.local/share/recently-used.xbel', but failed: Failed to create file '/root/.local/share/recently-used.xbel.JZ4TOX': No such file or directory gtk.main() /usr/share/system-config-firewall/ GtkWarning: Attempting to set the permissions of `/root/.local/share/recently-used.xbel', but failed: No such file or directory gtk.main() [root@localhost nate]# [root@localhost nate]# cat/etc/sysconfig/iptables bash: cat/etc/sysconfig/iptables: No such file or directory [root@localhost nate]# iptables-L bash: iptables-L: command not found... [root@localhost nate]# Chapter 25, Unit 7, Lab 1 (NT 1430,U2,GA1) Nathaniel Hayes, Jr. Enterprise Linux-NT 1430 November 5, 2014 Professor Rahming [nate@localhost ~]$ su Password: [root@localhost nate]# system-config-firewall (system-config-firewall:2395): GVFS-RemoteVolumeMonitor-WARNING **: cannot connect to the session bus: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. (system-config-firewall:2395): GVFS-RemoteVolumeMonitor-WARNING **: cannot connect to the session bus: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the......

Words: 712 - Pages: 3

Premium Essay

Unit 2 Lab 2: Self - Control

...Jaime H. Cabigtnig Unit 2 Lab 2: Self - Control TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?| Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family| Cursing|Donate $2 to charity|Reward myself with a positive word for today| Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers | Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally| Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight| Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.| Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions| Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’......

Words: 352 - Pages: 2

Premium Essay

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. ( 7. That user information pertaining to...

Words: 285 - Pages: 2

Free Essay

Nt1430 Unit 3 Lab

...Wanda Gonzalez Thursday 10/16/14 GS1145 Unit 5 My name is Wanda and the five words that I have chosen are Respect, Responsibility, Dependability, Attitude, and Discipline. Dependability means reliable, worthy of trust, and that you can be counted on no matter what. When I say that I am going to do something you can consider it done. My friends and family know that they can depend on me .Responsibility means to be accountable for something within my power. When I was in the military I was in charge of a number of soldiers. It was my job to keep them as safe as possible and assure that they had what they needed to get the job done. I was taught to pay my debts no matter how long it takes. Attitude is a feeling in regards to a person or thing. Thanks to my time in the military I was taught to have a positive can do attitude. All through my life I have always had a matter of fact attitude, tell it like it is whether you like it or not. Discipline is training to act in accordance with rules; drill. In basic training we did the same drills over and over again till we were proficient at it. I was always very disciplined in carrying out my job and my orders. Respect is esteem for a sense of the worth or excellence of a person. I was raised by my grandmother and she taught me respect;” yes mam, no mam” and if we didn’t she would not hesitate to smack me. I have high regards for people in authority such as law enforcement, Commander......

Words: 424 - Pages: 2

Free Essay

Lab 2

... | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after......

Words: 1139 - Pages: 5

Dora the Explorer | Just Dance 4 (Xbox 360) | Скачать APK