Review Questions
1: | Why should you not assume that all “quiet” users are well-behaved citizens of your environment? |
2: | What kind of malicious activity would a sudden increase in disk usage indicate? |
3: | Would you use the wall command or email to announce a system shutdown that is taking place in 5 minutes? |
4: | How would you locate the owner of the network address 172.16.0.1? |
5: | Why is IDENT an unreliable service for accurately identifying remote users? |
Get Unix® System Management Primer Plus now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.