UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003

Similar documents
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2016/2017 NETWORK SECURITY

Spectrum Scale Virtualization in Test and Development

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER TWO EXAMINATIONS 2017/2018 NETWORK SECURITY

UNIX File Hierarchy: Structure and Commands

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATIONS 2015/2016 FACILITATING E-COMMERCE MODULE NO: CPU6005

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER ONE EXAMINATION 2015/2016 ROUTING FUNDAMENTALS MODULE NO: CPU5010

Exploring the system, investigating hardware & system resources

Deploying VNFs Using AutoVNF

CS370 Operating Systems

Permission and Ownership

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2017/2018 NETWORK MANAGEMENT MODULE NO: CPU6009

Connection Broker Where Virtual Desktops Meet Real Business. Installing Leostream Connect on HP Thin Clients

BASH SCRIPT TIPS. function jumpto { label=$1 cmd=$(sed -n "/$label:/{:a;n;p;ba};" $0 grep -v ':$') eval "$cmd" exit }

Essential Unix and Linux! Perl for Bioinformatics, ! F. Pineda

Introduction to Unix May 24, 2008

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

DAVE LIDDAMENT INTRODUCTION TO BASH

1.3 What does Ctrl-D, Ctrl-A, Ctrl-F and Ctrl-T do in terms of command line editing? (6)

Getting Started with Linux

(32 KB) 216 * 215 = 231 = 2GB

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

CSC209. Software Tools and Systems Programming.

. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy.

Goals for This Lecture:

System Administration

1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions

Linux Essentials Objectives Topics:

Filesystem Hierarchy and Permissions

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2016/2017 NETWORK MANAGEMENT MODULE NO: CPU6009

Arkansas High Performance Computing Center at the University of Arkansas

It is recommended to complete the tutorial using a web browser from the same operating system as your Putty or SSH client (e.g. Ubuntu terminal).

CSC209. Software Tools and Systems Programming.

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?

Fall 2015 COMP Operating Systems. Lab #8

Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of

cs642 /operating system security computer security adam everspaugh

EECS2301. Lab 1 Winter 2016

High-Availability Storage with GlusterFS on CentOS 7 - Mirror across two storage servers

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

First Five Minutes on a System. What to do and why

Filesystem Hierarchy and Permissions

for Cloud Computing University of Washington Tacoma Fall

Lecture 2: The file system

CS631 - Advanced Programming in the UNIX Environment

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Lecture 2b. Pathnames, files, special characters in filenames, and file permissions. COP 3353 Introduction to UNIX, FALL 2013

CS197U: A Hands on Introduction to Unix

The landscape. File hierarchy overview. A tree structure of directories The directory tree is standardized. But varies slightly among distributions

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Processes are subjects.

The Ultimate Linux/Windows System

Recover Deleted Files With Scalpel

CSE 565 Computer Security Fall 2018

LAN Setup Reflection

Student Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3.

Basic Linux Command Line Interface Guide

iscsi storage is used as shared storage in Redhat cluster, VMware vsphere, Redhat Enterprise Virtualization Manager, Ovirt, etc.

LPI LPI Level Junior Level Linux Certification Part 1 of 2. Download Full Version :

Linux Systems Administration Getting Started with Linux

Files

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Open up a terminal, make sure you are in your home directory, and run the command.

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

CS246 Spring14 Programming Paradigm Notes on Linux

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro

Linux for Beginners. Windows users should download putty or bitvise:

Universidad Carlos III de Madrid Computer Science and Engineering Department Operating Systems Course

Practical 5. Linux Commands: Working with Files

Oracle Tablespaces, etc.: Managing the Disk Resource

Operating Systems, Unix Files and Commands SEEM

3.5 Inch TFT Display

Dell Storage Center with Flocker

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Introduction to Linux Basics

Privileges: who can control what

Configure NFS Staging for ACS 5.x Backup on Windows and Linux

Mills HPC Tutorial Series. Linux Basics I

Unix System Architecture, File System, and Shell Commands

LING 408/508: Computational Techniques for Linguists. Lecture 20

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.

24 Writing Your First Script

File System. yihshih

Linux Tutorial #7. quota. df (disk free) du (disk usage)

Data Security and Privacy. Unix Discretionary Access Control

To understand this, let's build a layered model from the bottom up. Layers include: device driver filesystem file

commandname flags arguments

Evolutionary Genetics

Self-test Linux/UNIX fundamentals

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division

CSE 265: System and Network Administration

client X11 Linux workstation

Contents in Detail. Acknowledgments

Introduction to the shell Part II

CMPSC 497 Attack Surface

Basic Linux Command Line Interface Guide

LAB #7 Linux Tutorial

Transcription:

[CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS TO CANDIDATES: There are SIX questions. Answer ANY FOUR questions. All questions carry equal marks.

Page 2 of 5 Question 1 1a. Below is an example of the df command showing the space available on various file systems. [adami@localhost home]$ df Filesystem 1K-blocks Used Available Use% Mounted on /dev/mapper/centos-root 30385668 3874168 26511500 13% / devtmpfs 924680 0 924680 0% /dev tmpfs 941400 0 941400 0% /dev/shm tmpfs 941400 9252 932148 1% /run tmpfs 941400 0 941400 0% /sys/fs/cgroup /dev/sda1 1038336 197056 841280 19% /boot tmpfs 188284 12 188272 1% /run/user/1001 Show how this output can be modified using a Bash script to display the information as an HTML table. (16 marks) 1b. The above image shows the output of the ifconfig command showing Ethernet interface settings on a Linux system. Show how you can use single line unix command to extract the following information from the output: i. The IPv6 address (fe90::b957:7ad6:28e:e41a in the above text) ii. iii. The broadcast address (10.0.2.225 above) The number of received (RX) packets (164254 above) (9 marks)

Page 3 of 5 Question 2 2a. Compare and contrast three different forms of loop that can be used in a bash script. You should give detailed examples of the three different loop structures you have identified and explain how each is best used. Use sample code to illustrate your answers. (15 marks) 2b. Explain how the test condition e.g. [ some condition ] can be used to evaluate string variables, numerical tests and file based tests. Give examples of each kind of test using either an if statement or a loop. Question 3 This question deals with using bash to process HTML form data, each part of the question looks at a different step of the process. 3a. Explain the two different mechanisms used by a web browser to pass form variables to a server using either the HTTP GET or HTTP POST methods. 3b. Describe with the aid of some sample code how the collection of form variables can be retrieved in a Bash script for both HTTP GET and POST methods. 3c. Using example code where necessary show how the individual HTML form variables can be separated into bash shell variables with corresponding values. 3d. HTTP encodes any punctuation characters in form variables before they are sent to the server. Explain why this is necessary. Once more with the aid of example code, explain how these encoded characters can be decoded in a Bash script to restore their original values.

Page 4 of 5 Question 4 4a. Examine the following output: [ai1@webserver]$ ls l total 8 -rwxr-xr-- 1 ai1 staff 2877 Jan 15 13:37 start-up.sh [ai1@webserver]$ The user ai1 would like to change the permissions on start-up.sh so that other members of the staff group can read the file but not execute it. No other permissions should be changed. Show two different ways to achieve this. 4b. Examine the following output and provide an explanation of the permissions listed and explain who has permission to do what. [ai1@webserver]$ ls l total 8 -rwxr-x--- 1 ai1 staff 2877 Jan 10 10:31 unlock drwxr-xr-- 1 ai1 staff 245 Jan 11 15:43 scripts [ai1@webserver]$ (4 marks) (11 marks) 4c. Explain what the sticky bit is used for in terms of file permissions. How can you set the sticky bit and how can you see whether it is set? (4 marks) 4d. Why might you use the setuid permission for a script or executable file? Explain how you would set this permission and explain why this might represent a serious security problem. (6 marks)

Page 5 of 5 Question 5 5a. Consider this statement: Using threads rather than processes to handle HTTP requests give a performance boost to a web server. To what extent to you agree with the above statement? Give reasons for your answer and clearly explain the difference between processes and threads. 5b. All users are idiots, or out to get you is a favourite quote of your lecturer. In the context of a web server running Bash CGI scripts identify threats and vulnerabilities which justify the quote. (15 marks) Question 6 6a. What is meant by the pipe symbol ( ) in the Bash environment. Give examples of ways this is useful. 6b. Explain the different meaning of the three different types of quotes that can be used in a Bash script as shown in the following examples: value= 1232 ex1= $value ex2= $value ex3=`ls` What would be the values of ex1, ex2 and ex3 in this instance? 6c. What is the difference between an absolute path and a relative path when specifying the path to a file or directory? 6d. Assuming you have an executable file called script.sh with the correct permissions in your current directory, why would you type./script.sh to run that file? END OF QUESTIONS