Mod 8 Day 5 Flashcards

1
Q

Directives that Define the parameters of the main server which responds to request not handled by a virtual host

A

Main server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Container used to maintain information about multiple domains / hostnames on one web server

A

Virtual host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Directives that control the overall operation of the Apache server process as a whole

A

Global environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command is used to check syntax errors for the httpd.conf file without restarting the server

A

Apachectl -t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What main server directive provides the name and Port that the server uses to identify itself to incoming request

A

Server name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What global environment directive defines the top of the directory tree where the servers configuration, error, and log files are stored

A

Server root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What main server directive defines the default directory that will contain all web pages related documents and files

A

Document root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what global environment directive instructs the web server to accept incoming request on a specified port or IP address and Port combination

A

Listen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tracks access agent and referrer information and identifies the location of the file that stores a record of access attempts to the web

A

Custom log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sets the name of the file where the server errors will be logged

A

Error log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Controls the types of messages logged to the error_log

A

Log level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The main server directive contains three sections used to control logging what are they

A

Custom log
Error log
Log level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the commands used in conjunction with the telnet protocol to gain information about the HTTP request and response Header information

A

Get

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reveals the entire HTTP request and message body

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reveals the web server version and Os information only without the body

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what Solaris program puts system interfaces in a promiscuous mode with intent of capturing packets on the network in real time or can redirect them to a capture file format

A

Snoop

17
Q

In Solaris give the syntax to capture packets, not resolve address to name, and use the IP 192.168.0.83

A

Snoop -r 192.168.0.83

18
Q

What Solaris command sends all captured packets to a file called /tmp/my.cap 4 Port 22 only?

A

Snoop -o /tmp/my.cap port 22

19
Q

In Linux what is the syntax to capture 100 packets on eth4 in verbose mode and ASCII format displaying IP address and port numbers and write the packets to /tmp/my_pcap.

A

tcpdump -c 100 -avn eth4 -w /tmp/my_pcap

20
Q

What Linux command and syntax is used to view the /tmp/my_pcap file

A

tcpdump -r /tmp/my_pcap

21
Q

Names and locations of Route server files and Zone files are specified in what main configuration file associated with DNS

A

/etc/named.conf

22
Q

What software handles all DNS configuration information

A

BIND

23
Q

This file controls how host names are resolved system-wide

A

/etc/nsswitch.conf

24
Q

In what file is simple name resolution (local look up) configured?

A

/etc/hosts

25
Q

What file specifies the DNS server

A

/etc/resolve.conf

26
Q

What utility is used as a security and data Integrity tool monitors and send alerts on specific file changes and functions as a host-based intrusion detection system

A

Tripwire

27
Q

file Integrity can be established and verified with this hashtag tool that generates a 32 digit hexadecimal hash corresponding to file contents

A

MD5

28
Q

This hashing tool is not secure but it’s still used in PKI as part of a certificates generator

A

MD2

29
Q

What are the four tripwire modes

A

Database update
Database initialization
Integrity checker
Interactive update

30
Q

In Ubuntu what program is used to install packages and patches

A

Apt packet

31
Q

This package manager is able to install packages but is unable to track dependencies. However it will warn of other packages that need to be listed first

A

Redhat package manager RPM