We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Apply Hardened Security for Linux Services & Applications Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

A limited time offer!

Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Apply Hardened Security for Linux Services & Applications Essay Sample

1. When configuring services, what Linux directory typically contains server configuration files? /etc

2. What command disables remote access to the MySQL Database? Is this a security hardening best practice? Bind-address=YOUR-SERVER-IP, If you don’t need remote access, then binding should be considered a best practice.

3. What is a Linux runlevel for a specific service of application? What command allows you to define the runlevel uniquely for a service or application? 0 – System halt; no activity, the system can be safely powered down. 1 – Single user. 2 – Multiple users, no NFS (network filesystem). 3 – Multiple users, command line interface; the standard runlevel for most Linux-based server hardware. 4 – User-definable. 5 – Multiple users, GUI. 6 – Reboot. telinit

4. What is the Apache Web Server? Review the /etc/httpd/conf/httpd.conf configuration file, and point out a setting that could enhance security. Web server application noted in its help creating the World Wide Web, ResourceConfig /dev/null

5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use of telnet is discouraged. Associated messages including passwords are sent in cleat text so if a hacker is using a packet sniffer then he now has access to any usernames or passwords.

6. What are Symbolic links?

A special type of file that contains a reference to another file or directory in the form of an absolute or relative path

7. Why is it recommended to disable Symbolic Links in MySQL? To prevent various security risks

8. Why would you add the ‘skip-networking’ command?
To prevent remote access and to disallow access to load a local file.

9. What two files does sendmail create while processing a message? File: “df”: This stores the body of the message. File: “qf”: This stores the headers and other information. 10. What command can you use locally to find the sendmail’s version number? sendmail -d0.4 -bv root

We can write a custom essay

According to Your Specific Requirements

Order an essay
Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member