Mod 8 Day 5 Flashcards

(31 cards)

1
Q

Directives that Define the parameters of the main server which responds to request not handled by a virtual host

A

Main server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Container used to maintain information about multiple domains / hostnames on one web server

A

Virtual host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Directives that control the overall operation of the Apache server process as a whole

A

Global environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command is used to check syntax errors for the httpd.conf file without restarting the server

A

Apachectl -t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What main server directive provides the name and Port that the server uses to identify itself to incoming request

A

Server name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What global environment directive defines the top of the directory tree where the servers configuration, error, and log files are stored

A

Server root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What main server directive defines the default directory that will contain all web pages related documents and files

A

Document root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what global environment directive instructs the web server to accept incoming request on a specified port or IP address and Port combination

A

Listen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tracks access agent and referrer information and identifies the location of the file that stores a record of access attempts to the web

A

Custom log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sets the name of the file where the server errors will be logged

A

Error log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Controls the types of messages logged to the error_log

A

Log level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The main server directive contains three sections used to control logging what are they

A

Custom log
Error log
Log level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the commands used in conjunction with the telnet protocol to gain information about the HTTP request and response Header information

A

Get

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reveals the entire HTTP request and message body

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reveals the web server version and Os information only without the body

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what Solaris program puts system interfaces in a promiscuous mode with intent of capturing packets on the network in real time or can redirect them to a capture file format

17
Q

In Solaris give the syntax to capture packets, not resolve address to name, and use the IP 192.168.0.83

A

Snoop -r 192.168.0.83

18
Q

What Solaris command sends all captured packets to a file called /tmp/my.cap 4 Port 22 only?

A

Snoop -o /tmp/my.cap port 22

19
Q

In Linux what is the syntax to capture 100 packets on eth4 in verbose mode and ASCII format displaying IP address and port numbers and write the packets to /tmp/my_pcap.

A

tcpdump -c 100 -avn eth4 -w /tmp/my_pcap

20
Q

What Linux command and syntax is used to view the /tmp/my_pcap file

A

tcpdump -r /tmp/my_pcap

21
Q

Names and locations of Route server files and Zone files are specified in what main configuration file associated with DNS

A

/etc/named.conf

22
Q

What software handles all DNS configuration information

23
Q

This file controls how host names are resolved system-wide

A

/etc/nsswitch.conf

24
Q

In what file is simple name resolution (local look up) configured?

25
What file specifies the DNS server
/etc/resolve.conf
26
What utility is used as a security and data Integrity tool monitors and send alerts on specific file changes and functions as a host-based intrusion detection system
Tripwire
27
file Integrity can be established and verified with this hashtag tool that generates a 32 digit hexadecimal hash corresponding to file contents
MD5
28
This hashing tool is not secure but it's still used in PKI as part of a certificates generator
MD2
29
What are the four tripwire modes
Database update Database initialization Integrity checker Interactive update
30
In Ubuntu what program is used to install packages and patches
Apt packet
31
This package manager is able to install packages but is unable to track dependencies. However it will warn of other packages that need to be listed first
Redhat package manager RPM