What command would let you most safely switch to runlevel 2 without rebooting the computer? Pg 431 Telinit 2 7. What type of control does SELinux implement? Pg 414 Mandatory Access Control 8. Know all of the possible states of SELinux . Pg 414 Enforcing Permissive and Disable 9. The files hosts. allow and hosts. deny belong to what security system? Pg 447 TCP Wrappers 10. Given the following entries, what will happen when a client at address 172. 16. 24. 100 tries to access a Web site running on this server? Pg 447-448 hosts. allow httpd : 172. 15. * vsftpd: 192. 168. 0. * sshd: 172. 16. 24. 100 hosts. deny httpd : 172. * sftpd : 172. 16. 24. 100 sshd : 172. 16. * The Connection Will Be Denied 11. Know all of the valid iptables chains. Pg 821 Forward , Input,Output 12. What is the purpose of a chroot jail? Pg 449 to create a directory that a server thinks is the root directory, thereby blocking access by the server to all other areas of the file system 13. Know all of the printing protocol supported by CUPS. Pg 520 LPD/LPR, SMB, IPP 14. Know all of the valid methods of configuring a CUPS server. Pg522,527,533 Command-line tools,Web interface,Printer configuration applet 15. Linux printer driver files end with what extension? Pg 533 .ppd 16.
SSH1 is vulnerable to what. Pg 622 it is vulnerable to man-in-the-middle attacks 17. What is the file and path name where an OpenSSH client stores its list of servers to which it has connected Pg 624 ~/. ssh/known_hosts 18. You need to give SSH access to Charlie, Linus, and Lucy. Know what you would put in the configuration file to make that happen. Pg 636 AllowUsers Charlie Linus Lucy 19. What is the file and path name of the configuration file to which you would add the line specified in study point 18? Pg 636 /etc/ssh/sshd_config 20. What option do you pass to the OpenSSH client to tell it to tunnel the X-Windows (X11) protocol?
The Essay on Ring Topologies File Server
Bus Topology A Bus Topology is the oldest and most simple method of networking a group of workstations. The computers are set up in series from a single server in a straight line. Although easy to implement it is prone to problems as the network connection once broken separates all the other workstations, beyond that connection, redundant as well. So if the first link from server to computer were ...
Pg 639 -x 21. Know the path and file name that contains a list of all directories made available on the network by NFS. Pg 739 /etc/exports 22. Know the entry in the file listed in study point 21that would make the directory /nfs available to all clients on the 192. 168. 10. 0/24 subnet and give them read and write access? Pg 739,740 (B) 23. Know the fstab entry that would properly mount /usr from the server appserv onto the root directory. Pg 735 (D) 24. Which command line utility will change a Samba password? Pg 752 smbpasswd 25. Know all of the Samba configuration files? Pg 752,753 smb. conf, smbpasswd, smbusers 6. Which operating mode is generally necessary when running an FTP client behind a firewall? Pg 644 passive 27. What effect does the listen directive in vsftpd’s configuration file have? Pg 657 it directs vsftpd to run in standalone mode. 28. Which transfer mode is useful when transferring text files to Windows computers? Pg 650 ascii 29. The ability for one physical Web server to act as multiple servers is called ___________. Pg 874 virtual hosting 30. Which Apache directive is actually a container? Pg 858 VirtualHost 31. Know all of the advantages of using DHCP over static address assignments. Pg 451,452 32.
Know all of the valid DHCP options. Pg 447,448 subnet-mask, broadcast-address, domain-name-server 33. In which directory does BIND store its database files when it is running in Fedora’s chroot jail? Pg 794 /var/named/chroot/var/named 34. Know all of the record types that maps a host name to an IP address and is used for forward lookups. Pg 780 A (address), Cname, MX, NS, PTR, SOA 35. Know all of the record types maps an alias to a host name. Pg 780 CNAME 36. Which configuration file would an administrator normally modify in order to change the IP address that sendmail listens on? Pg 673 sendmail. mc 37. What port does sendmail listen on?
The Research paper on Analysis of UNIX System Configuration Case Study
... All other configuration files are maintained in a central location under RCS. The configuration directory is ... 1-4 servicefstab 1 1 OS sendmail 2 1 servicegroup 4 1-2 ... operating system. The kernel, libraries, server processes, controlling files, initial applications and whatever else ... file. The hosts database at this site is comprehensive, including information such as architecture type, IP address, ...
Pg 671 25 38. Which file allows sendmail to host accounts for multiple domains? Pg 681 virtusertable 39. Dovecot provides which two protocols? Pg 689 IMAP and POP 40. Know all of the examples of an MTA. Pg 669 sendmail 41. What file is used to tell a Linux system which resources to use (and in what order) for services such as authentication and name resolution? Pg 696 /etc/nsswitch. conf 42. The main configuration file for LDAP is __________. Pg 711 /etc/openldap/ldap. conf 43. The root, or top-level, domain in an LDAP hierarchy is called the _______. Pg 711 DSE 44. What port does LDAP use for unencrypted traffic . Pg 713 89 45. What represents a fully Distinguished Name? Pg 711 cn=joe. ou=workers;dc=factory. dc=com 46. What can be best described as a divider between fields in a data file? Pg 1024 Delimiter 47. In regular expressions, which character is used to tell a utility to look for the given string at the beginning of the line? Pg 1026 ^ 48. Which set of characters is used to define a character class in regular expressions. Pg 1024,1025 [] 49. Which scripting utility has the same text editing features as vi, but is used in scripts rather than interactively? sed 50. Which scripting utility works very well with data in columns?