Lab03_Report_Template
.docx
keyboard_arrow_up
School
Rochester Institute of Technology *
*We aren’t endorsed by this school
Course
221
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by HighnessValor13716
Name: ________________________________________ Grade ____/100
Use this template to answer questions related to Lab 3. Submit this template to the Lab Report 03 (LR02) drop box by the due date. Late submissions are subject to a 20% penalty. You must use this template and submit the document in Microsoft Word or Adobe PDF any other format will result in a zero grade for the report. When submitting your document, please save it in the following format, use LR02, followed by an underscore, followed by the first initial of your first name in uppercase, and your entire last name with the first letter in uppercase. Example: LR03_GArcoraci.doc.
Each answer is worth a maximum of 20 points.
Question 1 – SSH Key-Based Authentication
Discuss the advantages and the process of setting up key-based authentication in SSH over traditional password authentication. How does key-based authentication enhance security? Include in your answer the steps required to generate, deploy, and use SSH keys for secure access to a remote server.
Question 2 – Git Configuration Describe the differences between the 'global' and 'system' configuration levels in Git. When would you use each of these configuration levels? Provide examples of scenarios where you would apply settings at the global level and others where you would use the system level? Question 3
– Git Commit
Explain the importance of writing clear and descriptive commit messages in Git. What are the key rules or guidelines you should follow when composing a commit message? Illustrate your answer with examples of good and bad commit messages from the lab.
Question 4
– Git Repositories
Explain the differences between an upstream repository and a local (or working) repository in Git. How do these repositories interact during the development process? Provide examples to illustrate the roles and functions of each type of repository in a typical Git workflow.
Question 5 – Linux User Accounts and System Files
Explain the roles and significance of the /etc/passwd
, /etc/shadow
, and /etc/skel
files in managing Linux user accounts. How do these files interact to ensure security and customization of user environments? Provide specific examples of how each file contributes to user account management?
Arcoraci
Spring 2235
Make sure to include all screenshots for the report. For each missing screenshot, you will receive a 5% penalty to the grade. If your screenshots do not have the required information, are illegible, blurry, or unreadable, will not be receive credit. Any attempt to alter the information in the screenshots in any way is academic dishonesty, and you may fail the course.
All screenshots must be labeled, using the following titles. Figure 1
– Git Repository Verification
Figure 2
– Git Log Revision History
Figure 3
– Git Merge Verification
Figure 4
– User Command History
Figure 5 – Root Password Change Verification
Arcoraci
Spring 2235
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help