Trent King CIT 436 Lab 3
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
0102
Subject
Computer Science
Date
May 4, 2024
Type
docx
Pages
8
Uploaded by ProfWillpower13160 on coursehero.com
Trent King CIT 436 Lab 3 1/29/2024 1.
Why do you suppose Apache uses the LoadModule directive? That is, why is Apache separated into modules?
Apache uses the LoadModule directive to enable modular functionality. This modular design allows for easy customization, enabling only required features and thus optimizing performance. It's a practical approach to managing server capabilities.
2.
For each LoadModule directive, the syntax is LoadModule name file. What is the pattern for the module names? Where are all the modules located? What is the pattern for the modules’ file names?
After examining the LoadModule directives in Apache's httpd.conf, I found that module names typically start with mod_, such as mod_ssl. These modules are located in a directory /usr/lib/. The file names for these modules mirror their module names and end with a .so extension, for example, mod_ssl.so.
3.
Issue an egrep command to count the number of LoadModule directives found in httpd.conf and the number of LoadModule directives that are commented out. How many total LoadModule directives are there? How many are commented out? What can you conclude about the default version of Apache in terms of its capabilities?
After running the egrep commands on the httpd.conf file, I found that a majority of the LoadModule directives are commented out. This indicates that the default Apache configuration is streamlined for essential functionality, with many advanced features disabled to optimize performance and security. This setup allows for customization based on specific server requirements.
4.
Issue an egrep command to count the number of <IfModule> containers in the conf file. How many are there?
To count the number of <IfModule> containers in the Apache httpd.conf file, I issued the following egrep command: egrep -c '<IfModule' httpd.conf. This command counts each occurrence of the <IfModule> opening tag. It indicates that there are 25 <IfModule> containers within the configuration file. This number of containers suggests a modular and flexible Apache setup, where specific configurations are conditional on the presence of certain modules.
5.
In vi, search forward for the first <IfModule> container. What module is it testing for? What directives are applied if the module is loaded? Search backward through the LoadModule statements. Is this module loaded by default?
In httpd.conf, I found the first <IfModule> container testing mod_ssl.so for secure connections. It had relevant directives. Checking LoadModule, I confirmed mod_ssl.so is active by default, highlighting Apache's focus on security.
6.
Search forward for the second <IfModule> container. This container tests for the module that defines the directive DirectoryIndex. What does this directive do (read the comment preceding it)?
I located the second <IfModule> container, which checks for the module defining the DirectoryIndex directive. This directive specifies the default index file for directories. It determines the file displayed when accessing a directory on a web server.
7.
Imagine that you expect directories to have index files with several extensions, such as index.html, index.cgi, index.shtml and index.php. To support this, you edit this directive and add all of these other filenames. Does the order you list these matter? If so, why?
The order you specify in the DirectoryIndex directive matters. Apache serves the first listed index file it encounters.
8.
At the bottom of the first screen is a comment that describes ServerRoot. What does this comment say? Move forward one screen; what is the location of ServerRoot? In your second terminal window, cd to that location. What items do you find here?
The comment at the bottom of the first screen in the httpd.conf file describes ServerRoot as the base directory for server files and runtime data. Moving forward one screen, I found the location of ServerRoot
specified in the file. In my second terminal window, I navigated to that location using the cd command. At
this location, I found essential subdirectories and files for Apache's configuration and operation, including
directories like conf, logs, modules, and various configuration files, logs, and resources necessary for Apache to function correctly.
9.
Move forward in vi by one screen; you should see the next server directive. What is it and what does it define? It lists a port. What else could it list (hint: read the comment that precedes the directive)?
Moving forward in vi by one screen, I found the next server directive in the httpd.conf file. This directive defines the port that Apache will listen on for incoming requests. It lists a specific port number, Regarding what else it could list, the comment preceding the directive suggests that it could specify
alternative ports. This directive allows configuring Apache to listen on multiple ports to serve different types of traffic or applications.
10.
Scroll down five more screens in vi and you will reach the <IfModule> statement you were asked
about in 1c. Move down another screen and you will reach the next server directive. What is it and what is it used for? What is the default value? What should you change this to?
Moving down in vi, I found the next server directive. It's used to configure the KeepAlive feature in Apache, which controls whether multiple requests and responses can be sent over a single TCP connection. The default value is set to On, enabling KeepAlive. Depending on specific needs or performance considerations, it may be good to change this to Off in high-traffic scenarios to optimize resource usage.
11.
Move down another screen and you will find ServerName, which you should have changed in lab
2. Also on this screen is the first of a few <Directory> containers, this one for /, the root of the Linux file system. Read the comment immediately before this entry. What does this directory container do (or prevent)?
Moving down another screen in vi, I found the ServerName directive, which have been configured previously. On this screen, there's also the first <Directory> container for the root directory /. The comment before this entry explains that this directory container sets rules and configurations for the root directory, specifying how Apache should handle access and requests, effectively preventing or allowing certain actions within the root directory.
12.
On the next screen you will find DocumentRoot. What does it define and what is the location of DocumentRoot? Immediately beneath this is a <Directory> container for this location. How does this directory container differ from the one you saw in 2d?
On the next screen in vi, I found the DocumentRoot directive, which defines the location where web content files are stored. Immediately beneath it, there's a <Directory> container specific to this DocumentRoot location. This directory container differs from the one in the previous question because it focuses on controlling access and permissions for the web content stored in the DocumentRoot directory, while the previous <Directory> container had a broader scope, relating to the root directory / of the Linux file system.
13.
The next screen has another <IfModule> container. The screen after that has a <Files> container. The <Directory> container impacts all URLs for the given directory (and subdirectories). How does the <Files> container differ? (hint: this is explained in the textbook and notes) What file(s) is
this <Files> container defined for?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
What does Apache Web Service software charge for their service? Which two companies provide technical support for users of the Apache Web Server?
arrow_forward
Question
Read about Thrift and Answer the following questions. Here is the link as well: https://thrift.apache.org/
What is going on here? How is this similar or different from JSON Schema or ProtoBuf?What is the definition of type Work?
arrow_forward
Apache Spark: What are some of the benefits of lazy evaluation of operations in Apache Spark?
arrow_forward
4. Use the Internet to learn about Apache OpenOffice. Is it available in different versions? What applications are included? Compare it to the Microsoft Office versions you researched in the previous project. Does Apache OpenOffice offer everything that Microsoft Office does? If not, what is missing?
arrow_forward
A web client cannot directly access a web server's protected resources without first using native authentication and authorisation services. Are there any other advantages to layered protocols? You should include instances to support your assertions.
arrow_forward
10.
You have an Azure subscription that contains an Azure Kubernetes Service (AKS) cluster named AKS1 and a user named User1.You need to ensure that User1 has access to AKS1 secrets. The solution must follow the principle of least privilege.Which role should you assign to User1?
1
Azure Kubernetes Service RBAC Admin
Azure Kubernetes Service RBAC Cluster Admin
Azure Kubernetes Service RBAC Reader
Azure Kubernetes Service RBAC Writer
arrow_forward
2) List ten apache project open source components which are widely used in Hadoop environments and explain, in one sentence, what each is used for – then - beside them, mention a proprietary component which accomplishes a similar task.
arrow_forward
What is the difference between Apache's access log and the error log?
arrow_forward
How to do Apache Optimization from WHM or C panel, what are the settings that I need to change for the highest performance in terms of page load and large video uploads?
arrow_forward
The MVC design pattern is often used when creating websites. In this case, how is the user's communication with the server most often realized (orange arrows in the picture)?
Select one:
a. The user communicates from a client application (such as a Web browser) using the HTTP protocol. When a request is created with a specific URL, a controller is selected, which, after loading the data into the model, passes the model to the view and sends it in response.
b. The user communicates using the TCP / UDP protocol. The controller takes over the application call and selects the view that will handle the request. The view reads the data and sends a response to the user.
c. The user calls the controller via a client application (such as a Web browser or mobile application). The controller finds out from the model which view should be used, fills it with data and sends it in response to the user.
d. The user calls the controller via a client application (such as a Web browser). The…
arrow_forward
Hi I don't need the explanation just need correct answer from each:
What kind of access control model allows a resource owner to manage its permissions?
Role-based
Mandatory
Lattice-based
Discretionary
RBAC binds roles with users and also associates roles with what?
Transactions
Auditing
Objects
Resources
The primitive foundation of most MAC models is what?
Information flow
DAC
Capabilities
Bell LaPadula
What property in Bell LaPadula guarantees no read up?
Property
Simple security property
Strong tranquility
Weak tranquility
A reference monitor is ___________.
an AC policy.
an AC model.
an AC mechanism.
an AC procedure.
arrow_forward
In order for a web client to access the protected resources of a web server, the web client must first utilize the web server's native authentication and authorisation services. Is there any other advantage that may be gained by using layered protocols? You need to present instances to back up the assertions that you've made.
arrow_forward
Exercise 2-2 Enhance the Future Value application In this exercise, you’ll enhance the Future Value application by applying some of the skills that you’ve just learned.
Test the Future Value application 1. Make sure the Apache server is running. Then, start your browser and run the application in this directory: xampp\htdocs\ex_starts\ch02_ex2 To do that, you can use the index of exercise starts that you bookmarked in exercise 1-2 or you can use this URL: http://localhost/ex_starts/ch02_ex2/
2. Enter valid numbers in all three text boxes. For the first test run, keep these values simple like 100 for investment amount, 5 for yearly interest rate, and 10 for number of years. Then, click the Calculate button to display the results.
3. Click the Back button to return to the first page, enter invalid values in the first two text boxes, and click the Calculate button. Then, respond to the error message that’s displayed by entering valid data for the investment amount, re-entering…
arrow_forward
In this lab, your task is to use Active Directory Users and Computers to complete the following actions on the CorpDC server:
In the Users container, create a group named Managers. Configure the group as follows:
Group scope: Global
Group type: Security
Make the following users members of the Managers group:
Organization Unit
Username
Accounting
Mark Woods
Research-Dev
Pat Benton
Marketing\MarketingManagers
Juan Suarez
Research-Dev\ResearchManagers
Arlene Kimbly
Sales\SalesManagers
Mark Burnes
Support\SupportManagers
Shelly Emery
arrow_forward
While you're about it, why also discuss host-target interactions and the concept of "Reuse"?
arrow_forward
For a web client to get access to a web server's restricted data, the client must first use the server's built-in authentication and authorization features. Besides these, are there any other advantages of use layered protocols? You should include instances to back up your arguments.
arrow_forward
What are some key differences between General Public License v2.0 and Apache License 2.0 (Apache-2.0)?
arrow_forward
How does the "peerDependencyMeta" field enhance the flexibility of peer dependencies in packages?
arrow_forward
An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.
Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
A. Implement a VPN for all APIs.
B. Sign the key with DSA.
C. Deploy MFA for the service accounts.
D. Utilize HMAC for the keys.
~If you could explain why for the correct answer, I’d really appreciate that. Thank you!
arrow_forward
An organization started using VMM to manage its virtual servers and wants to create templates to deploy virtual machines easier. Provide a brief explanation as to how centralized management using VMM may benefit an administrator as well as where an admin might navigate to create useful templates. Provide a peer response regarding centralized management benefits for Administrators.
arrow_forward
Your company has grown significantly, and suddenly there is a significant increase in the usage of file servers. All of the file servers are in close proximity to the clients, and you're adding many more, resulting in a big group of servers. The number of namespace servers has also increased in recent years. Your original setup utilized the default options for the referral ordering mechanism and polling, which were both enabled. What modifications should you think about making?
arrow_forward
In this assignment, you are required to write a bash script, call it mycontainer.sh to do the following tasks:1) Create an LXD container based on ubuntu.2) Install the latest version of mysql on the container created in Step 1. Then, start the database and autostart it during future boots.3) Print the process ID of the running database, then give this process the highest possible priority.4 Inside the container, create a new systemd service to: Re-execute Step 3 to adjust the priority. Send a notification message to your AUIS email address(es). Call this new service ‘email-mysql.service’.5) Adjust systemd to run the ‘email-mysql.service’ automatically once every six hours.6) Lastly, include necessary Bash commands to upload your container to an ssh server with the IP address 192.168.1.1. Assume the username and password are 'auis' and 'pass123', respectively.
arrow_forward
The CSM Tech organization has a substantial web presence with several publicly accessible web and application servers. You have DNS servers that handle Internet queries for all your publicly accessible resources. However, after doing some statistics analysis on your public DNS servers, you find that your servers are handling recursive lookups for clients that are not within your organization. Your public DNS servers should handle recursive queries only for your internal clients, but the servers should handle iterative (nonrecursive) queries from external sources. What do you recommend? What are the commands needed to implement the solution?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- What does Apache Web Service software charge for their service? Which two companies provide technical support for users of the Apache Web Server?arrow_forwardQuestion Read about Thrift and Answer the following questions. Here is the link as well: https://thrift.apache.org/ What is going on here? How is this similar or different from JSON Schema or ProtoBuf?What is the definition of type Work?arrow_forwardApache Spark: What are some of the benefits of lazy evaluation of operations in Apache Spark?arrow_forward
- 4. Use the Internet to learn about Apache OpenOffice. Is it available in different versions? What applications are included? Compare it to the Microsoft Office versions you researched in the previous project. Does Apache OpenOffice offer everything that Microsoft Office does? If not, what is missing?arrow_forwardA web client cannot directly access a web server's protected resources without first using native authentication and authorisation services. Are there any other advantages to layered protocols? You should include instances to support your assertions.arrow_forward10. You have an Azure subscription that contains an Azure Kubernetes Service (AKS) cluster named AKS1 and a user named User1.You need to ensure that User1 has access to AKS1 secrets. The solution must follow the principle of least privilege.Which role should you assign to User1? 1 Azure Kubernetes Service RBAC Admin Azure Kubernetes Service RBAC Cluster Admin Azure Kubernetes Service RBAC Reader Azure Kubernetes Service RBAC Writerarrow_forward
- 2) List ten apache project open source components which are widely used in Hadoop environments and explain, in one sentence, what each is used for – then - beside them, mention a proprietary component which accomplishes a similar task.arrow_forwardWhat is the difference between Apache's access log and the error log?arrow_forwardHow to do Apache Optimization from WHM or C panel, what are the settings that I need to change for the highest performance in terms of page load and large video uploads?arrow_forward
- The MVC design pattern is often used when creating websites. In this case, how is the user's communication with the server most often realized (orange arrows in the picture)? Select one: a. The user communicates from a client application (such as a Web browser) using the HTTP protocol. When a request is created with a specific URL, a controller is selected, which, after loading the data into the model, passes the model to the view and sends it in response. b. The user communicates using the TCP / UDP protocol. The controller takes over the application call and selects the view that will handle the request. The view reads the data and sends a response to the user. c. The user calls the controller via a client application (such as a Web browser or mobile application). The controller finds out from the model which view should be used, fills it with data and sends it in response to the user. d. The user calls the controller via a client application (such as a Web browser). The…arrow_forwardHi I don't need the explanation just need correct answer from each: What kind of access control model allows a resource owner to manage its permissions? Role-based Mandatory Lattice-based Discretionary RBAC binds roles with users and also associates roles with what? Transactions Auditing Objects Resources The primitive foundation of most MAC models is what? Information flow DAC Capabilities Bell LaPadula What property in Bell LaPadula guarantees no read up? Property Simple security property Strong tranquility Weak tranquility A reference monitor is ___________. an AC policy. an AC model. an AC mechanism. an AC procedure.arrow_forwardIn order for a web client to access the protected resources of a web server, the web client must first utilize the web server's native authentication and authorisation services. Is there any other advantage that may be gained by using layered protocols? You need to present instances to back up the assertions that you've made.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education