Module Title: Advanced Systems Administration 2



Similar documents
13.1 Backup virtual machines running on VMware ESXi / ESX Server

How to Backup XenServer VM with VirtualIQ

PaperStream Connect. Setup Guide. Version Copyright Fujitsu

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Introduction to Operating Systems

How to Use NoMachine 4.4

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas

Using Network Attached Storage with Linux. by Andy Pepperdine

RemoteTM LAN Server User Guide

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Table of Contents. Online backup Manager User s Guide

How to use FTP Commander

The Einstein Depot server

Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server

Extending Remote Desktop for Large Installations. Distributed Package Installs

Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0.

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

IBM WebSphere Application Server Version 7.0

Final Year Project Interim Report

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Navigating the Rescue Mode for Linux

Network Security and Penetration Testing

There s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh

Using SSH Secure Shell Client for FTP

Author A.Kishore/Sachin VNC Background

Configure Backup Server for Cisco Unified Communications Manager

File Transfer Examples. Running commands on other computers and transferring files between computers

Mobile App User's Guide

Using LDAP Authentication in a PowerCenter Domain

Backing Up TestTrack Native Project Databases

Remote Desktop In OpenSUSE 10.3

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann

1. Scope of Service. 1.1 About Boxcryptor Classic

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Introduction to MSI* for PubH 8403

WA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

Training on Linux System Administration, LPI Certification Level 1

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Secure Agent Quick Start for Windows

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

AN INTRODUCTION TO UNIX

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

Xopero Backup Build your private cloud backup environment. Getting started

Mobile Labs Plugin for IBM Urban Code Deploy

IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE. Version

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

HW 07: Ch 12 Investigating Windows

Manual for using Super Computing Resources

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

ASX SFTP External User Guide

Experian Secure Transport Service

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Backup & Disaster Recovery Appliance User Guide

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Lab 8: Configuring Backups

How to FTP (How to upload files on a web-server)

In order to upload a VM you need to have a VM image in one of the following formats:

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

An Oracle White Paper July Oracle Linux and Oracle VM Remote Lab User Guide

Release Notes. Cloud Attached Storage

How to connect to ArcSDE spatial database using OpenOffice and Microsoft Office suites

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Virtual Server Installation Manual April 8, 2014 Version 1.8

Spectrum Technology Platform. Version 9.0. Spectrum Spatial Administration Guide

Installing the SSH Client v3.2.2 For Microsoft Windows

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA USA

FTP Accounts Contents

VPN Overview. The path for wireless VPN users

Accessing RCS IBM Console in Windows Using Linux Virtual Machine

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

PowerChute TM Network Shutdown Security Features & Deployment

Getting Started with RES Automation Manager Agent for Linux

Online Backup Client User Manual

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Backing Up Your System With rsnapshot

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

IT6204 Systems & Network Administration. (Optional)

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Security Advice for Instances in the HP Cloud

Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary

Using Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000

PN Connect:Enterprise Secure FTP Client Release Notes Version

Connecting to the School of Computing Servers and Transferring Files

Task Scheduler. Morgan N. Sandquist Developer: Gary Meyer Reviewer: Lauri Watts

Linux System Administration. System Administration Tasks

Review On Incremental Encrypted Backup For Cloud

CTERA Agent for Linux

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

INASP: Effective Network Management Workshops

Transcription:

CORK INSTITUTE OF TECHNOLOGY INSTITIÚID TEICNEOLAÍOCHTA CHORCAÍ Semester 1 Examinations 2012/13 Module Title: Advanced Systems Administration 2 Module Code: COMP 7021 School: Mathematics & Computing Programme Title: Bachelor of Science in Computing in IT Support Award Bachelor of Science (Hons) in IT Management Programme Code: KITSU_7_Y3 KITMN_8_Y3 KITSP_7_Y3 External Examiner(s): Internal Examiner(s): Dr. Anthony Keane Mr. G. McSweeney Instructions: Answer 4 questions. All questions are worth equal marks. Duration: 2 Hours Sitting: Winter 2012/13 Requirements for this examination: Note to Candidates: Please check the Programme Title and the Module Title to ensure that you have received the correct examination. If in doubt please contact an Invigilator. 1

1. (a) Some versions of UNIX are shipped with the utility program crypt. What is the purpose of crypt and briefly explain how it works. (b) Name a suitable protocol for remote login. (1 Mark) Name an unsuitable protocol for remote login. Give a reason why it s not suitable. (d) What is meant by a passive attack on a communications line? (e) Write down an example of a passive attack. Suse Linux and opensuse contain the utility visudo. What is the purpose of visudo? The struxnet worm is an example of cyber-terrorism. Briefly, explain what struxnet did. (h) Why might the cron utility be useful when doing backup? (i) What is a replay attack? (j) With reference to password encryption, what is a salt? (k) Demonstrate the diffie hellman method of shared key exchange. The formulas used are: (g b mod p) a mod p (g a mod p) b mod p (6 Marks) 2

2. (a) (b) Write an awk command to calculate and display the total number of hard links in the current directory. (6 Marks) Write a sed command to change all users default shell to bash (/bin/bash). What should an administrator do before carrying out the command in (b) above? (d) Write a sed command to delete all users whose default group id is 1000. (e) Suggest one advantage and one disadvantage of using an open-source application (e.g. openoffice) instead of propriety software (e.g. Microsoft Office). A user wishes to download and install an open-source application (such as openoffice). He clicks on the download icon on the application s web-site and the file openoffice.tar.gz is downloaded to his machine. What should the user do next to install the software and make it available to all users? (5 Marks) Name three different types of licenses an administrator might have to acquire when purchasing software. (h) What is the purpose of the environmental variable PS1? (1 Mark) 3

3. (a) List the main characteristics of cloud computing. (5 Marks) (b) What is meant by a hybrid cloud? Dropbox is an example of a cloud file-hosting service. Users can avail of limited storage free but have to pay for further capacity. Suggest some reasons why a business might use a service like dropbox for storing their data. (4 Marks) (d) What is meant by Bare-Metal Hypervisor Virtualisation? (e) With reference to disk quotas explain what hard and soft limits are. With reference to disk quotas, what is a grace period? (1 Mark) A disk quota for a user reports as follows: Filesystem blocks soft hard inodes soft hard /dev/md3 6617996 6900000 7000000 17397 0 0 Explain what each of these items mean. (7 Marks) (h) What file would you edit to enable quotas in your file system? 4

4. (a) A user wishes to download a Linux version of Java. He is offered the following choice: jdk-7u7-linux-i586.tar.gz jdk-7u7-linux-i586.rpm What is the difference between them? (b) What is the purpose of the zypper command? (d) On the same site, a windows version of java jdk-7u7-windows-i586.exe is also available. What type of file is this and how might it be installed on a windows machine? Once the Linux version is installed, explain how a user might add the java compiler to his PATH. Assume the compiler is located in /java/bin. (e) How might the PATH in above be made permanent? (h) The java compiler file - javac is located in /java/bin. Describe how a user could make two types of link to the compiler from his current directory? (4 Marks) How would an administrator limit access to a directory of executables for specific users? Suggest three guidelines a company might consider when developing an e-mail policy. (i) What does the term RAID mean? (j) Why is RAID 0 sometimes not regarded a real RAID level? (1 Mark) 5

5. (a) Describe how to use the cron service works in Linux. (5 Marks) (b) Apart from cron, name another Linux scheduling service. What is the purpose ssh service? (d) (e) Suse Linux has separate directories to control services to be started at different runlevels. Why does each directory contain symbolic (soft) links to service programs rather than the actual services? (4 Marks) A part of the output of the ps command of a Linux machine contains the following: UID PID PPID CMD root 2560 1 httpd What does this mean? (4 Marks) With reference to process states, draw a diagram to represent the seven state model. (4 Marks) What is meant by the suspended states? (h) What is the purpose of the dispatcher? 6