Sunday, March 3, 2019

Is418 Lab8

IS 418 LAB 8 1. Explain the following instruction rpm qf/bin/ls -RPM command is used for ordering, un incloseing, upgrading, querying, distinguishing, and checking RPM packages on your Linux system. 2. debate the purpose of a software monument as it relates to YUM. -The yum system does not require any routine maintenance. It is useful to disable or take repository definitions that are no longer required, as each repository that is defined and enabled is checked for every operation. You may also wish to periodically remove files relating to unwanted packages, in order to save disk infinite 3.How can one ensure a download diddlysquat roll is legitimate and hasnt been tampered with? -Run a checksum test 4. List and explain at least 3 switches available with the tar command that can be useful in extracting and installing a tarball -ark 5. List and explain at least 3 switches associated with the rpm command that can be leveraged to verify, list and install rpm packages? tar zxvf makefile. tar. gz cd make file ./install/ 6. What security countermeasure can you enable to verify the integrity of download diligence or tar balls before you perform the installation? -used Ark to extract the tar ball . Explain what hashing is and how does this differ from encryption? -Hashing is just line of recruit and it not encrypted 8. If you wanted to know which package a certain program belonged to, what command would you hang in? -tar xvzf PACKAGENAME. tar. gz 9. Once you have downloaded an RPM package, what command would you run if you want to extract the files to a directory of your choice -tar xzvf file. tar. gz 10. Where would you find checksum hashes for all install program in a Fedora Core Linux Server? -Verification jurisprudence called a hash computed from the original ISO files.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.