How can a user perform additional configuration tasks after installation in Linux?
What will be an ideal response?
After installation, most of the system configuration is complete. The user can perform additional configuration tasks using the built in configuration tools for each component or by using configuration programs such as webmin or the linuxconf (Linux Configuration) program. The configuration programs are used to simplify the process to add or maintain all of the critical system applications to keep the system running properly.
You might also like to view...
The Linux log file that can reveal attempts to compromise the system or the presence of a virus or spyware is ______________
a. /var/log/kern.log b. /var/log/apache2/* c. /var/log/lighttpd/* d. /var/log/apport.log
Suppose that you use the SSL protocol and connect to a merchant site, M. The site sends you M’s certificate. When the SSL protocol completes, howcan you be sure that the newsession key can be known only to M (perhaps an intruder has sent you a copy of M’s certificate)? Can you be sure that you are connected to M?
What will be an ideal response?