• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/102

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

102 Cards in this Set

  • Front
  • Back
pwd
Present Working Directory
Main features of Unix
Multi-User, Multi-tasking, Portability
What does the Kernel do?
Schedules taks, manages data/file access and storage, enforces security mechanisms, and performs all hardware access.
What are the four basic Shells?
Bourne Shell, Korn Shell, C-shell, and Bourne-Again Shell
The purpose of Shell?
Presents each user with a prompt, executes user commands, and supports a custom environment for each user. (Talks to the Kernel directly)
/etc
System administration and configuration files.
Relative path
Allows you to take shortcuts to access files rather than specifying.
Absolute Path
Uniquely identifies a file by providing the full pathname of the file beginning with the root "/" directory.
/etc/passwd
Contains all the users and their account information.
/etc/shadow
Contains password encryption and password aging.
/etc/inetd.conf
Internet daemon setup file.
/opt
Contains additional packages and optional 3rd party software.
which
Shows path for executing commands.
clear
Clears screen.
cal
Displays calendar.
/bin
Binary. Contains executable programs used at the command line ie ls, mkdir, cp.
/dev
Block and device files. Some systems will have subdirectories containing device files.
/proc
Contains processes used by the system.
/tmp
Contains files used by the system.
/sbin
Contains programs utilized by to boot the system.
/export/home
Where users' home directory resides.
mkdir
Creates directory
rmdir
Removes an EMPTY directory.
more
Displays the file contents one screen at a time.
cat
displays the file on the screen
tail
Displays last few lines of a file.
head
Displays first few lines of a file.
Anatonomy of a UNIX command.
Command, option switch, argument.
man
Displays on-line manual pages about command.
ls
Lists the contents of a directory.
pwd
Displays the name of the present working directory.
cd
Change working directory.
mv
Moves or renames files and directories.
cp
Copy files.
rm
Delete files.
find
Locates files having certain characteristics, which you specify.
grep
Searches a file or files for lines that contain strings of a certain pattern.
passwd
Enables user to change their password or the system administrator to change a user's password.
chmod
Changes permissions on a file/directory
su
Switch users, used to change from your current user account to another, commonly used to switch to root user to perform functions requiring root privelages.
useradd
Adds user via command line interface.
ps
Displays status of all active processes that your terminal controls.
kill
Entirely eliminates/stops a process.
tar
Tape archive utility: used to archive files to tape or disk
gzip
Compresses files and saves them with a .qz file extension.
gunzip
Decompresses files with the .gz file extension.
ifconfig
Used to set the characteristics of the network interface.
ifconfig pcn0 down/up
Either brings device down or up.
ifconfig pcn0
Displays current interface configuration.
netstat
Multi-purpose command to view network status/activity.
who
Displays who's logged in.
whoami
Displays who your logged in as.
touch
Creates a file with nothing in it
df
Reports on amount of free disk space available on the specified file system.
vi
Provides basic text editing capabilities.
shutdown -i
Which run-level to run out.
shutdown -5
Shutdowns the system.
shutdown -6
Reboots the system.
shutdown -g
Shutdown with a grace period.
shutdown -y
Tells the system to automatically answer "yes" to all system prompts.
Run-level 0
Used to terminate operating system and bring it to PROM firmware prompt, where it is safe to power down.
Run-level 1
Single-user/administrative state- Multi-user file systems are available, but multi-user processes, such as those that allow users to log in from terminals outside the console, are not available.
Run-level 2
Multi-user state- File systems are started. All facilities except Network File Service (NFS) are available over the network.
Run-level 3
Multi-user state mode, including NFS.
Run-level 4
User-defined state This state is not defined by the system. Not Used!!!
Run-level 5
Used to bring the system to a state where it is safe to power it down, then powers down automatically.
Run-level 6
Stop and reboot state- Stops the operating system and reboot.
Three aspects of vi that make it appealing?
1. vi is normally supplied with all UNIX systems.
2. vi uses a small amount of memory, which allows efficient operation when the network is busy.
3. vi uses standard alphanumeric keys for commands, you can use it on virtually any terminal or workstation in existence without having to worry about unusual keyboard mappings.
What are the two modes of operation for vi?
Command and input.
vi command mode
Characters you type perform actions like moving the cursor, cutting or copying text, or searching for some particular text.
vi input mode
You type to insert or overwrite text. When you start vi, it is in command mode.
vi deletion commands
1. x - Delete only one character.
2. D - Delete to the end of the line.

3. dd - Delete the current line.
vi Insertion commands
1. i - Insert before cursor

2. I - Insert at beginning of line.

3. o - Insert below current line.

4. a - append, inserts beyond the cursor.
vi exit commands
:w Saves last changes to a file
:q Quits the vi editor
:q! Quits vi without saving.
:wq Saves and quits.
:set nu Will display line numbers for each line.
What are the three classes of file permissions?
Owner, group, and other
Owner
The actual owner of the file or directory.
Group
Group ownership of the file or directory.
Other
All other users on the system.
What are three permissions?
r,w,x
r
Indicates read permissions for the owner.
w
Indicates write permissions for the owner.
x
Indicates execute permissions for the owner.
What are the two main types of backups?
Full backup and Incremental backup?
Full backup
Defined as backing up an entire system's configuration files.
Incremental backup
Defined as backing up only the files that have changed since the last full or last incremental backup.
Two popular backup and restore utilities?
TAR and DUMP
DUMP
Backs up file systems.
DUMP level 0
Performs full backups.
DUMP level 1-9
Backs up all files altered since previous dump of a lower level.
Vulnerabilities with UNIX can be broken into what two security concepts?
Network Based and Host Based
/etc/inetd.conf
Contains internet related daemons. ie- telnet, ftp
What is ASET?
Automated Security Enhancement Tool. An integrated Solaris software package utilized to enhance host-based security.
ASET low security does what?
Performs several checks and reports potential secuirity weaknesses.
ASET medium security does what?
Reports security weaknesses and modifications it makes to restrict access.
ASET high security does what?
Provides a highly secure system and modifies many settings of system files and parameters.
ln
creates a link
Default permissions for a directory and file?
Directory 777

File 666
pgrep
shows you the process ID number
which
shows the path of executable of files.
umask
Changes the default permissions and is a subtractive value.
syslog.conf
syslog configuration file
syslogd
system logging daemon