StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Configuration Files - Assignment Example

Cite this document
Summary
The paper "Security Configuration Files " discusses that it is essential to state that one good reason why Linux android was selected to be the platform for android smartphones is that it provided a user interface whose base is on direct manipulation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Security Configuration Files
Read Text Preview

Extract of sample "Security Configuration Files"

Internal hardware for instance gyroscopes, proximity sensors and accelerometers are made use of by certain applications for corresponding to more user actions such as adjustment of the screen to landscape from portrait. This depends on the manner of the devices orientation. Another reason is because it enables its users to customize the home screens they use with shortcuts for applications and widgets that allow the users display live content like weather contents and emails, on the home screen directly.
3 (a) Server USPHL010 will have less resource capacity than server USPHL020.

(b) This is because server USPHL010 has the UFW software which blocks some incoming rules hence allowing only fewer resources unlike server USPHL020 which allows in all incoming rules.

(c) Server USPH010 is more secure than server USPH020.
(d) This is because server usph010 has uncomplicated firewall software which protects it from unwanted/dangerous rules, unlike server USPHL020.
4. Before DNS was a common practice, internet users consulted internet service provider to resolve host names. SRI transmitted the file as well as updated it.
5. The changes made to /etc/network/interfaces fail to take effect because some of the components could be missing like the ID, the scheme such as HTTP, and an incomplete host name. Only the path is provided, and is not complete either.
6. A grep c, or grep command file name does allow someone to search multiple files or a single file for lines which contain a pattern. In a case where matches were fund, 0 is the exit status and 2 is the case where errors occurred.

Internal hardware for instance gyroscopes, proximity sensors and accelerometers are made use of certain applications for corresponding to more user actions such as adjustment of the screen to the landscape from the portrait. This depends on the manner of the orientation of the device. Another reason is that it enables its users to customize the home screens they use with shortcuts for applications and widgets that allow the users to display live content like weather contents and emails, on the home screen directly.
3 (a) Server USPHL010 will have less resource capacity than server USPHL020.

(b) This is because server USPHL010 has the UFW software which blocks some incoming rules hence allowing only fewer resources, unlike server USPHL020 which allows in all incoming rules.

(c) Server USPH010 is more secure than server USPH020.
(d) This is because server usph010 has uncomplicated firewall software which protects it from unwanted/dangerous rules, unlike server USPHL020.
4. Before DNS was a common practice, internet users consulted internet service providers to resolve hostnames. SRI transmitted the file as well as updated it.
5. The changes made to /etc/network/interfaces fail to take effect because some of the components could be missing like the ID, the scheme such as HTTP, and an incomplete hostname. Only the path is provided and is not complete either.

6. A grep c, or grep command file name does allow someone to search multiple files or a single file for lines that contain a pattern. In a case where matches were found, 0 is the exit status and 2 is the case where errors occurred.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment #4 Example | Topics and Well Written Essays - 500 words”, n.d.)
Assignment #4 Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1633109-assignment-4
(Assignment #4 Example | Topics and Well Written Essays - 500 Words)
Assignment #4 Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1633109-assignment-4.
“Assignment #4 Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1633109-assignment-4.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Configuration Files

The IPv6 Implementation and Its Configuration Plan

In the paper "The IPv6 Implementation and Its configuration Plan" the realization of the latest IP version is proposed.... The Dynamic Host configuration Protocol server will be maintaining a database that will have IP addresses as well as configuration information and the associated data.... Upon its receipt of the data requests from clients, the Dynamic Host configuration Protocol server will be determining which of the available networks will be connected to the DHCP clients....
18 Pages (4500 words) Case Study

A Network Infrastructure

Infrastructure and Security Name Institution Infrastructure and Security A network infrastructure is an organization and configuration of interlinked computer systems, of a corporation, connected through various pieces of communication architecture.... Network security, on the other hand, involves protecting the laid computer infrastructure from unauthorized access, continuity of services by assets, and continuity and integrity of operations.... Therefore, network infrastructure laid out in an organization, works hand in hand with network security and cannot do with either of them being present (Stilwell et al, 2006)....
4 Pages (1000 words) Essay

Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component

The primary aim of network security is to prevent data loses.... This paper intends to identify the ways in which Linux operating system can be used as a network security device or component.... Network security is also crucial for ensuring integrity of messages transmitted over the network.... In other words, network security is important for achieving authorized access, confidentiality, authentication and integrity of information transmitted over the network (Yu & Le, 2000) B....
11 Pages (2750 words) Essay

Information Security of Java and NET

The paper "Information security of Java and NET" describes that both platforms and development environments offer their advantages and disadvantages to users as well as programmers and it remains up to the individual programmer or the company itself to select one or the other.... security and the related configurations for both Java and .... ET, the GUI can be used to adjust all security configurations much as the GUI tool supplied with Java....
11 Pages (2750 words) Research Proposal

SNMP for Diagnostics and Troubleshooting Network Problems

The results from the observation of executing of commands showed that files that do not have a proper set of properties such as extension, descriptive properties, and those out of an event's limitation standard return error messages blacking the operations from continuing further....
18 Pages (4500 words) Research Paper

Advanced Routing in the Computer Networking Environment

The Dual-Stack involves the configuration of specific sections of the network.... Therefore, this type of configuration happens normally in the same layers of the two networks combined.... Just like most of the other systems some of the factors of the network system IPv6 include the availability of the new system, the mode of addressing to be used types of connectivity, routing strategy, quality of service, scalability, and performance, reliability, accessibility, security, fault tolerance and some other minor factor making up the bigger network....
6 Pages (1500 words) Assignment

Computer Security Analysis Project

The paper 'Computer security Analysis Project' states that the core business of the computer being to create, manipulate, store and retrieve data, file system only provides support for the same but taking it to higher levels, file system provides a way of organizing, storing, retrieving and managing information in a computer disk.... This makes it possible for them to enforce security measures for the file systems....
13 Pages (3250 words) Case Study

Enhancing Enterprise Security

The Dean's laptop has information assets such as faculty salary information, committee notes, email addresses, budget reports containing salary details of Saunders employees, and PowerPoint files that are used in various presentations.... he Dean's laptop has information assets such as faculty salary information, committee notes, email addresses, budget reports containing salary details of Saunders employees, and PowerPoint files that are used in various presentations....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us