Review Questions

1:Why should you not assume that all “quiet” users are well-behaved citizens of your environment?
2:What kind of malicious activity would a sudden increase in disk usage indicate?
3:Would you use the wall command or email to announce a system shutdown that is taking place in 5 minutes?
4:How would you locate the owner of the network address 172.16.0.1?
5:Why is IDENT an unreliable service for accurately identifying remote users?

Get Unix® System Management Primer Plus now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.