Front | Back |
1.
What is Udev?
|
Udev is the device manager
for the Linux kernel. It mainly manages device nodes in /dev.
|
1.
How do you obtain hardware information using YaST?
|
It’s as simple as
opening YaST and going to Hardware à Hardware Information
|
1.
Describe
the Runlevels 0 to 6 in Linux.
|
Run
levels are a mode of operation in Linux operating systems. There are six runlevels altogether.
0 is HALT, while 1 is Single User. 2 and 3 are Multiuser modes of operation,
and 4 and 5 are reserved by the system.
|
1.
Briefly describe the boot process in Linux.
|
The first thing the boot process goes
through is the power-on-self-test to check for hardware changes or
dependabilities. Afterwards, it loads the kernel which is the main part of the
operating system. It will then load all the drivers needed and load the init
(User space).
POST-> BIOS ->Kernel->MODULES->INIT
|
1.
What is Automounter in Linux?
|
An automounter is any program that auto-mounts a
filesystem in response to a user operation. (DAEMON)
|
1.
What is NFS?
|
The
Network File System (NFS) was developed to allow machines to mount a disk
partition on a remote machine as if it were a local disk. It allows for fast,
seamless sharing of files across a network.
|
1.
What is a root CA?
|
In cryptography and computer security, a root certificate is either an unsigned public key certificate or a self-signed
certificate that identifies the Root Certificate Authority (CA). A root certificate
is part of a public key
infrastructure scheme. The most common commercial variety is based on the ITU-T X.509 standard, which normally
includes a digital signature from acertificate authority (CA).
|
What is Secure Shell?
|
Secure Shell (SSH) provides a secure means of connecting computers over an inherently insecure medium. One of the most common uses of SSH is to facilitate remote login sessions between an authorized user and a trusted host over the Internet. With the release of SSH2, users have the benefit of added functionality and security.When comparing SSH2 to SSH1, it's important to note that SSH2 is not simply SSH1 with new protocols plugged in. It's a complete rewrite of the original protocol and has now incorporated built-in protections against a number of known vulnerabilities in SSH1.
|
What is the difference between SSH1 and SSH2?
|
SSH version 2 is complete rewrite of the protocol and it has incorporated protection against a number of known vulnerabilities from that ssh v1 has.
SSH version 2 uses different encryption and authentication algorithms. While SSH1 uses DES, 3DES, SSH v2 dropped the use of DES, since it is now considered a weak encryption algorithm. Also, SSHv2 uses DSA instead of RSA as an authentication algorithm. |
1. Describe
the common initial handshake procedure for both SSH1 and SSH2 connections.
|
Client establishes a connection with the server. Client and server agree on a protocol to use. SH2 uses HMAC authenitcation.
|
What is LDAP?
|
Lightweight Director Access Protocol. It stores information about authenticated users and the privileges they have.
|
We
|
We
|
We
|
We
|