The Linux distribution that I currently recommend for testing purposes is __________ .
Debian
Fedora
Gentoo
Slackware
OpenWrt is primarily used on embedded devices to route network traffic.
True
False
The package format used by Fedora is __________ .
APK
deb
rpm
tgz
The desktop environment that I typically use in Linux is __________ .
Cinnamon
GNOME
KDE
XFCE
The Linux command used to report file system disk space usage is __________ .
df
du
free
top
When working in the command line, which key to you press to retrieve the most recent entered command?
Home
PrtScn
Tab
Up Arrow
When working in the command line, which key to you press to activate command-line completion?
Home
PrtScn
Tab
Up Arrow
The popular, but not user-friendly, text file editor that I highly recommend learning how to use is __________ .
ed
emacs
pico
vi
Consider Lab 1.1 Questions 7.1e and 8.6c ("How can you be sure ...") when answering the following question.
How can you trust unencrypted data sent over the network?
Computers always tell the truth
Magic
Tradition
You can't
Consider Lab 8.4 Question 7.14b ("In what way does this feature make the web server less secure?") when answering the following question.
It is a good idea to use the same password for all your accounts.
True
False
Answers:
1) Fedora
2) True
3) rpm
4) GNOME
5) df
6) Up Arrow
7) Tab
8) emacs
9) You can't
10) False
The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo...
The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo Slackware The package format used by Fedora is __________ . APK deb rpm tgz The desktop environment that I typically use in Linux is __________ . Cinnamon GNOME KDE XFCE The Linux command used to report file system disk space usage is __________ . df du free top When working in the command line, which key to you press to retrieve the most recent...
Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following tasks based on the Linux Fundamentals lecture. For this lab, take screenshots for all major steps completed to illustrate that each task was successfully completed the same method as would be used for other labs). Tasks: 1. Create a new user named Billy Bob using the command linter face 2. Add Billy Bob to the sudoers group 3. Update and upgrade your Linux distribution...
LINUX QUESTIONS (dont have to display output, I will be running these commands myself to check the output) Display the command(s) used to do the following: create an empty file called history by using just a redirection operator. Verify and show. Show/verify all results (i.e., all commands and their corresponding outputs). Wait 1 minute or more and then display the command(s) used to do the following: change the timestamp on the history file you just created. Verify/display the change. Show/verify...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...