lab 8

lab 8


1. Explain the following command: rpm –qf/bin/ls
-Used to figure out what package the installed version belongs to.
2. Discuss the purpose of a software repository as it relates to YUM?
-The yum system does not require any routine maintenance. It is useful to disable or remove repository definitions that are no longer required, as each repository that is defined and enabled is checked for every operation.
3. How can one ensure a download tar ball is legitimate and hasn’t been tampered with?
-Run a checksum test
4. List and explain at least 3 switches available with the tar command that can be useful in extracting and installing a tarball.
–make install; will install the binary file. /configure; will make sure that the system has all the library files that are required to install the file tar xvzf file_name.tar.gz ; extracts the file specified (eg. file_name)
5. List and explain at least 3 switches associated with the rpm command that can be leveraged to verify, list and install rpm packages.
-rpm –ivh ; RPM filename has package name, version, release & architecture name (-i : install, -v : verbose, -h : print hash marks as the package archive is unpacked). rpm -qlp ; will list out the file without extracting into the local directory folder. rpm –Vp ; compares information about the installed files with information about the files taken from the metadata stored within the rpm database.
6. What security countermeasure can you enable to verify the integrity of downloaded applications or tar balls before you perform the installation?
-use Ark to extract the tar ball
7. Explain what hashing is and how does this differ from encryption?
-Hashing is just line of code and it is not encrypted
8. If you wanted to know which package a certain program belonged to, what command would you run?
-tar xvzf PACKAGENAME.tar.gz

9. Once you have downloaded an RPM package, what command would you run if you wanted to extract the files to directory of...

Similar Essays