Squid is a proxy caching server for web clients, supporting the
...
SMTP, which stands for Simple Mail Transfer Protocol, is the TCP/IP
...
Apache log files are an excellent analysis tool to see how effective
...
Authentication is a security property that identifies a user based on...
The desktop environment components include icons, panels, windows,...
The Linux file system comprises a number of standard directories
...
A computer worm is a self-replicating computer program. It uses a
...
Samba is an open source implementation of the SMB file sharing...
Access control is a security property that determines whether access...
Evolution is an email client program that can send and receive email
...
Kerberos is a network authentication protocol. It is designed to
...
X server program takes input from the keyboard and mouse and displays
...
The OpenOffice suite has filters that allow it to work with documents...
You launch a shell terminal window to work at the command line using...
Data striping is a technique for writing and reading data...
Rootkits may have originated as regular applications, intended to...
UPS is used to protect computer systems from power problems, such as...
To perform full and incremental backups, you use the cron utility to
...
Hardening a system means removing unnecessary tools, utilities and
...
The X is a standard graphical window system for the Linux and Unix...
GIMP is the primary image editing software in Linux and can be used to...
In Raid 3 and Raid 5, redundancy is achieved by the use of parity
...
RAID is a redundant array of independent disk drives used to protect
...
You have been called out to your client's site to investigate a
...
The default X startup configuration can be found in...
Free software programs, such as mush, elm, and mh, as well as Zmail,
...
What is the difference between telnet and SSH?
Which of the following is the BEST reason administrators should...
Linux throws away anything you write to
MTA is a mail transfer agent to
Which of the following tasks can be automated through scripts?
Why are some of the most critical systems the LEAST up-to-date?
Samba-enabled Unix machine offers the following services:
The daemon that controls logging is
Which of the following crontab entries will run at 1:30 each morning,
...
Which of the following is the best way to keep software secure?
Chkconfig utility ensures that
Which of the following describes how Apache web server works:
What does the /etc/mail/access file do?
Integrity is a security property that ensures information has not been...