Linux related 4 Describe basics of e-mail services such as Sendmail and Postfix:
ID: 3718554 • Letter: L
Question
Linux related 4
Describe basics of e-mail services such as Sendmail and Postfix:
Recall & describe database services associated with Linux
Recall and describe basic network diagnostic commands
Describe and outline common troubleshooting procedures
Describe different facets of Linux security:
Increase the security of a Linux computer
Outline measures and utilities that can be used to detect a Linux security breach:
Explain the basics of SELinux:
Describe SELinux running modes: enabled, disabled, permissive authentication:
Describe remote access facilities using the following:
?SSH (secure tunnels, SFTP, X11 forwarding, keygen)
Explanation / Answer
Answer)
The email services like sendmail and postfix are the message transfer agents which are being used to receive route and deliver the emails. The email texts are received along with the recipient address from among the user along with the remote hosts. Alias are created and forwarding functions are then implemented finally the message gets delivered to the destinations. The postfix uses the modular approach and also has multiple independent executables where as the sendmail is an always running daemon.
The database services that are associated with linux are as follows:
SQLPlus, mySQL, TSql etc,
The network diagnostic commands are as follows:
ipconfig: which is defined as a console command which is used to display the network settings issued by the Command line Interpreter.
netstat: Helps to show the active TCP connection and ports.
tracert: Checks the network packet that is being sent and the hops are received here.
The others are ping, pathping, telnet, ftp, route and etc.
The different troubleshooting procedures are as follows:
1) Getting the CPU based information
2) Getting the ram information
3) To check the temperature of the CPU
4) The hard drive space to be checked.
5) Hardware detection and software installation.
The facets of linux security are as follows:
1) Gives protection against the unauthorized access inside a corporate network.
2) Protects against malwares
3) Protects files against unauthorized modifications.
4) Notifies the administration by extensive monitoring and alerting function.
5) Has multiple scan engines.
The measures and Utilities used to detect the security breach are as follows:
1) Central Management System
2) Real time protection
3) Anti Malware
4) Firewall
5) Integrity Checking
The SELinux running modes are as follows:
1) Enabled: So as to support the permissive policies so that the system runs "Enabled" is used.
2) Disabled: If the SELinux is disabled then the application doesn't have a varied behavior even with Enforced or permissive mode. The generation of context are disabled.
3) Permissive Authentication: If one needs to run an application in a specific domain in enforced mode and in the other permissive mode hence permissive is being used.
SSH is other wise known as the secure shell which is defined as a cryptographic network protocol used in the Operating network services in an unsecured network. This is a secure tunnel in a client server architecture meant for an un secure connection.
It indeed provides strong authentications as it protects the communication with respect to security and integrity.
Hope this answer helps. :) Happy to help.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.