True/False Indicate whether the
statement is true or false.
|
|
1.
|
In the boot screen, pressing F5 selects an installation language.
|
|
2.
|
YaST selects the keyboard layout according to your language settings.
|
|
3.
|
JFS is a journaling file system developed by SGI.
|
|
4.
|
A logical volume cannot be formatted and mounted like a physical
partition.
|
|
5.
|
The root account should only be used for system administration, maintenance, and
repair.
|
|
6.
|
In Linux, interfaces to Ethernet adapters follow the naming scheme eth0, eth1,
eth2, and so on.
|
|
7.
|
You cannot assign more than one IP address to a device.
|
|
8.
|
You can use the ip tool to configure the routing table of the Linux
kernel.
|
|
9.
|
Routing settings made with the ip tool are kept even after you reboot your
system.
|
|
10.
|
If the ping command works, then both the physical and logical connections are
correctly set up between the two hosts.
|
|
11.
|
The Domain Name System (DNS) is one of the most important network
services.
|
|
12.
|
The names of the mail servers for the domain (MX entry) can be alias
names.
|
|
13.
|
LDAP runs over TCP/IP or other connection-oriented transfer services.
|
|
14.
|
SLES 9 ships with two Apache versions: Apache series 1 and Apache series
2.
|
|
15.
|
SMB services are provided by the NetBIOS protocol.
|
|
16.
|
Resources are differentiated according to what a user needs and how the access
to these resources is controlled.
|
|
17.
|
The best way to prevent physical access to a server is to lock the server in a
dedicated server room.
|
|
18.
|
The more software is installed, the less likely security problems will
occur.
|
|
19.
|
ACLs are a feature of the Linux kernel and are not supported by the ReiserFS,
Ext2, and Ext3 file systems.
|
|
20.
|
A check algorithm is applied before any process or application is granted access
to an ACL-protected file system object.
|
|
21.
|
Backing up data is one of the most important tasks of a system
administrator.
|
|
22.
|
Normally the data in the tar archive files is compressed.
|
|
23.
|
When copying data, rsync compares the source and the target directory and
transfers only data that has changed or been created.
|
|
24.
|
Backing up data is a task that you should perform on a regular basis.
|
|
25.
|
Stage 2 of GRUB includes file system drivers for ReiserFS, ext2, ext3, Minix,
JFS, XFS, FAT, and FFS (BSD).
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
26.
|
The booting option ____ boots the system installed on the hard
disk.
a. | Installation | c. | Installation - ACPI Disabled | b. | Boot from Hard
Disk | d. | Installation - Safe
Settings |
|
|
27.
|
The booting option ____ starts the installation process with the DMA mode
and any interfering power management functions disabled.
a. | Installation | c. | Installation - ACPI Disabled | b. | Boot from Hard
Disk | d. | Installation - Safe
Settings |
|
|
28.
|
When you select the ____ mode, you can load driver modules manually and change
the advanced installation settings.
a. | Manual Installation | c. | Rescue System | b. | Installation - Safe
Settings | d. | Boot from Hard
Disk |
|
|
29.
|
____ starts a minimal Linux system without a graphical user interface to allow
experts to access disk partitions for troubleshooting and repairing an installed system.
a. | Boot from Hard Disk | c. | Rescue System | b. | Installation | d. | Memory Test |
|
|
30.
|
In the boot screen, pressing the function key ____ selects an installation media
type.
|
|
31.
|
In the boot screen, pressing the function key ____ opens context-sensitive help
for the currently selected option of the boot screen.
|
|
32.
|
In the boot screen, pressing the function key ____ adds a driver update CD or
DVD to the installation process.
|
|
33.
|
For a normal installation, select ____ installation mode and then select OK
to proceed to the next step.
a. | Update an existing system | c. | New
Installation | b. | Boot installed system | d. | Repair Installed System |
|
|
34.
|
The installation settings headline ____ changes the installation mode.
a. | System | c. | Mouse | b. | Mode | d. | Partitioning |
|
|
35.
|
If the automatically generated partitioning scheme does not fit your needs, you
can change it by selecting the ____ headline.
a. | System | c. | Mouse | b. | Mode | d. | Partitioning |
|
|
36.
|
If you use only primary partitions, you are limited to ____ partitions per hard
disk.
|
|
37.
|
____ partitions are continuous ranges of disk cylinders,but can be
subdivided into logical partitions.
a. | Primary | c. | Extended | b. | Logical | d. | Physical |
|
|
38.
|
____ partitions do not require entries in the main partition
table.
a. | Primary | c. | Extended | b. | Logical | d. | Physical |
|
|
39.
|
The maximum number of logical partitions is fifteen on SCSI disks and ____ on
(E)IDE disks.
|
|
40.
|
The ____ partition is the partition for the operating system itself, and is
mounted under / in the installed system.
|
|
41.
|
____ is the successor of Ext2 and offers a journaling feature.
a. | Ext3 | c. | FAT32 | b. | FAT16 | d. | Swap |
|
|
42.
|
Using ____ you can create logical volumes, which spread over several physical
disks and partitions.
a. | LDAP | c. | LVM | b. | Scan Disk | d. | Defrag |
|
|
43.
|
With RAID ____, two hard disks are pooled together.
|
|
44.
|
In SLES 9, ____ is the name of the superuser, the administrator of the
system.
|
|
45.
|
You can run a(n) ____ service on your host to have a central facility managing a
range of configuration settings.
|
|
46.
|
The ____ authentication method configures the system to use the traditional
file-based authentication method.
a. | Local (/etc/passwd) | c. | LDAP | b. | NIS | d. | DHCP |
|
|
47.
|
____ is the network adapter built into the system.
a. | Device | c. | Address | b. | Link | d. | Broadcast |
|
|
48.
|
The SLES command-line tools for the network configuration use the term
____ when they actually mean an interface.
a. | address | c. | device | b. | link | d. | broadcast |
|
|
49.
|
The term ____ refers to the IP address assigned to a device.
a. | broadcast | c. | device | b. | link | d. | address |
|
|
50.
|
By sending a network packet to the ____ address, you can reach all hosts in the
locally connected network at the same time.
a. | device | c. | interface | b. | broadcast | d. | link |
|
|
51.
|
The term ____ refers to an entry in the routing table of the Linux
kernel.
a. | broadcast | c. | route | b. | driver | d. | interface |
|
|
52.
|
To display the IP address setup of all devices, enter the following command:
____.
a. | ip address show | c. | ip address delete | b. | ip link show | d. | ip address up |
|
|
53.
|
If you are only interested in the device attributes and not in the IP address
setup, you can enter the following command: ____.
a. | ip address show | c. | ip link add | b. | ip link show | d. | ip address attr |
|
|
54.
|
You can enter the following command to verify the assigned IP address:
____.
a. | ip link del dev eth0 | c. | ip address --show dev eth0 | b. | ip address ip dev
eth0 | d. | ip address show dev
eth0 |
|
|
55.
|
To enable a network device (such as eth0), enter the following command:
____.
a. | ip link set eth0 down | c. | ip link set eth0 enable | b. | ip link set eth0
up | d. | ip link set eth0
start |
|
|
56.
|
The configuration files for network devices are located in the directory
____.
a. | /var/sysconfig/network | c. | /local/sysconfig/network | b. | /usr/etc/sysconfig/network | d. | /etc/sysconfig/network |
|
|
57.
|
For Ethernet devices, the configuration filenames consist of ____- and the
hardware address of the device.
a. | ifcfg-eth-id | c. | eth-id-config | b. | sysconfig-eth | d. | cfg-id-eth |
|
|
58.
|
The file ____ contains a template that you can use as a base for device
configuration files.
a. | /doc/sysconfig/network/ifcfg.template | c. | /etc/sysconfig/network/ifcfg.template | b. | /local/sysconfig/network/ifcfg.template | d. | /var/network/ifcfg.template |
|
|
59.
|
To view the current routing table, enter the following command: ____.
a. | ip route show | c. | ip link show | b. | ip address show | d. | ip link route |
|
|
60.
|
Routes to the directly connected network are automatically set up when a device
is started. All other routes are saved in the configuration file ____.
a. | /local/sysconfig/network/routes | c. | /network/sysconfig/network/routes | b. | /etc/sysconfig/network/routes | d. | /inet.d/sysconfig/network/routes |
|
|
61.
|
The host name is configured in the file ____.
a. | /sys/HOSTNAME | c. | /etc/HOSTNAME | b. | /local/HOSTNAME | d. | /var/HOSTNAME |
|
|
62.
|
The name resolution is configured in the file ____.
a. | /var/resolv.conf | c. | /sys/resolv.conf | b. | /network/resolv.conf | d. | /etc/resolv.conf |
|
|
63.
|
Ping keeps sending packets until it’s terminated by pressing ____.
a. | Ctrl+A | c. | Ctrl+C | b. | Ctrl+B | d. | Ctrl+D |
|
|
64.
|
The ping command ____ option, specifies the number of packets to be sent. After
this number has been reached, ping is terminated.
a. | -c count | c. | -f | b. | -l device_addr | d. | -n |
|
|
65.
|
ping ____ sends packets without waiting for a reply.
a. | -f | c. | -n | b. | -l preload | d. | -w maxwait |
|
|
66.
|
ping ____ specifies a timeout in seconds, before ping exits regardless of how
many packets have been sent or received.
a. | -f | c. | -n | b. | -l preload | d. | -w maxwait |
|
|
67.
|
The diagnosis tool ____ is primarily used to check the routing between different
networks.
a. | ping | c. | ip | b. | traceroute | d. | nstat |
|
|
68.
|
____ is a distributed database system that allows local administration of areas
and guarantees unique computer names worldwide.
|
|
69.
|
There are over ____ computers worldwide that act as DNS root name
servers.
|
|
70.
|
For each domain there is one DNS server (or name server) defined as being
“in charge” of its domain. This server is known as the ____ server.
a. | secondary | c. | master | b. | slave | d. | key |
|
|
71.
|
The DNS ____ makes a request to a DNS server, interprets the answer (real
information or error message), and sends back this information to the program that called it
up.
a. | slave server | c. | name server | b. | database | d. | resolver |
|
|
72.
|
A ____ DNS server does not manage its own databases but merely accepts queries
and forwards them to other DNS servers.
a. | master | c. | caching-only | b. | primary | d. | slave |
|
|
73.
|
To define a mail server for the domain, a(n) ____ entry must be made in the DNS
database file for forward resolution.
|
|
74.
|
If you want a computer to be reached by more than one name, then corresponding
aliases must be given using ____ entries.
|
|
75.
|
As soon as a DNS slave server is started, it connects to the master server and
receives from it a copy of the zone files. This is called a ____.
a. | notify | c. | name list | b. | zone transfer | d. | name resolution |
|
|
76.
|
The most important command-line tool for querying a DNS server is called
____.
a. | host | c. | dns | b. | dig | d. | dnslookup |
|
|
77.
|
____ is a lightweight protocol for accessing directory services.
|
|
78.
|
The configuration files for OpenLDAP are located in the directory ____.
a. | /var/openldap/ | c. | /sys/config/ldap/ | b. | /etc/openldap/ | d. | /openldap/config/ |
|
|
79.
|
OpenLDAP provides the command ____ to insert data that is in LDIF format into
the directory.
a. | mount | c. | ldapadd | b. | host | d. | dig |
|
|
80.
|
SLES 9 comes with the graphical LDAP browser ____.
|
|
81.
|
If you want the Web server to start up at boot time, you need to enter the
following: ____.
a. | http://localhost | c. | http://your_system_IP_address | b. | insserv
apache2 | d. | rcapache2
stop |
|
|
82.
|
The configuration of the Apache Web server is spread over several configuration
files located in the directory ____.
a. | /var/apache/conf | c. | /etc/apache2 | b. | /sys/conf/apache | d. | /usr/apache2/conf |
|
|
83.
|
The options of the Apache configuration files are called ____.
a. | directives | c. | parameters | b. | includes | d. | conf-sections |
|
|
84.
|
Apache can use the ____ protocol to encrypt the connection.
|
|
85.
|
A public key that is signed by a CA is called a ____.
a. | Ticket | c. | Token | b. | VISA | d. | Certificate |
|
|
86.
|
The ____ protocol is a network protocol that provides file and print services in
a Windows network.
|
|
87.
|
____ enables Linux to use SMB so that Linux can work in a Windows
environment.
|
|
88.
|
File or print services offered by a Samba server are called ____.
a. | directives | c. | ObjectClasses | b. | shares | d. | container
objects |
|
|
89.
|
Creating a security concept begins with a ____ analysis.
a. | return of investment | c. | communication | b. | risk | d. | barrier |
|
|
90.
|
The ____ determines what security demands are required for specific data and
resources.
a. | security policy | c. | ROI analysis | b. | communication analysis | d. | barrier study |
|
|
91.
|
The ____ represents the lowest level of software and lies underneath the
operating system.
a. | Boot Loader | c. | MBR | b. | GRUB | d. | BIOS |
|
|
92.
|
You can use the following command to check which services are configured to
start and their run levels: ____.
a. | chk --config | c. | config --check | b. | chkconfig -l | d. | cfg --chk |
|
|
93.
|
Authentication on a Linux system is based on ____.
|
|
94.
|
The PAM modules are located in the directory ____.
a. | /etc/security | c. | /lib/security | b. | /usr/security | d. | /security/pam |
|
|
95.
|
PAM configuration is done in the directory ____.
a. | /lib/pam.d/ | c. | /usr/pam.d/ | b. | /etc/pam.d/ | d. | /local/security/pam.d |
|
|
96.
|
The ____ module sets resource limits for the users that can be configured in the
file /etc/security/limits.conf.
a. | pam_limits.so | c. | pam_pwcheck.so | b. | pam_unix2.so | d. | pam_env.so |
|
|
97.
|
The Apache Web server runs under the user id of the user ____.
a. | apache | c. | wwwapache | b. | wwwrun | d. | apachesvr |
|
|
98.
|
If the ____ bit is set for an executable, the program is started under the user
ID of the owner of the file.
a. | SUID | c. | sticky | b. | SGID | d. | SSID |
|
|
99.
|
If the ____ bit is set, it lets a program run under the GID of the group to
which the executable file belongs.
a. | sticky | c. | SSID | b. | SUID | d. | SGID |
|
|
100.
|
The ____ bit prevents users from deleting each others files that are stored in
these directories.
a. | SUID | c. | sticky | b. | SGID | d. | SSID |
|
|
101.
|
Traditionally, three sets of permissions are defined for each file object on a
Linux system. These sets include the read (r), write (w), and ____ permissions.
a. | delete (d) | c. | copy (c) | b. | erase (e) | d. | execute (x) |
|
|
102.
|
A(n) ____ ACL comprises the entries for the types owner, owning group, and
other, which correspond to the conventional permission bits for files and directories.
a. | maximum | c. | minimum | b. | extended | d. | comprehensive |
|
|
103.
|
A(n) ____ ACL contains a mask entry and can contain several entries of the named
user and named group types.
a. | maximum | c. | minimum | b. | extended | d. | comprehensive |
|
|
104.
|
The command ____ can be used to change the ACL of a file.
a. | setfacl | c. | lsfacl | b. | getfacl | d. | chgfacl |
|
|
105.
|
A(n) ____ ACL is a special kind of ACL that defines the access permissions that
objects under the directory inherit when they are created.
a. | extended | c. | subdirectory | b. | default | d. | file |
|
|
106.
|
____ enables a high level of local security. Systems that are used as a network
server should be run with this setting.
a. | Level 1 (Home Workstation) | c. | Level 3 (Network
Server) | b. | Level 2 (Networked Workstation) | d. | Custom Settings |
|
|
107.
|
____ represents the lowest level of local security. It should only be used on a
home workstation that is not connected to any kind of network.
a. | Level 1 (Home Workstation) | c. | Level 3 (Network
Server) | b. | Level 2 (Networked Workstation) | d. | Custom Settings |
|
|
108.
|
____ lets you create your own level of local security.
a. | Level 1 (Home Workstation) | c. | Level 3 (Network
Server) | b. | Level 2 (Networked Workstation) | d. | Custom Settings |
|
|
109.
|
The Web site ____ offers an overview of all SUSE related mailing lists.
a. | www.suse.de/en/business/mailinglists.html | b. | www.securityfocus.com/ | c. | www.susesecurity.com/ | d. | www.linux.suse.security.de/ |
|
|
110.
|
In a(n) ____ backup, all system data is copied to a backup media once a
day.
a. | full | c. | differential | b. | incremental | d. | exclusive |
|
|
111.
|
The disadvantage of the full backup method is the ____.
a. | backup network | c. | backup window | b. | backup media | d. | backup strategy |
|
|
112.
|
In a(n) ____ backup, you normally perform a full backup once a week. Then you
perform a backup every day that copies only files that have changed since the backup the day
before.
a. | full | c. | complete | b. | incremental | d. | differential |
|
|
113.
|
In a(n) ____ backup, you perform a full backup once a week, then you perform
backups every day to record the files that have changed since the last full backup.
a. | full | c. | complete | b. | incremental | d. | differential |
|
|
114.
|
The ____ format is a container format for files and directory structures. By
convention, the extension of the archive files end in .tar.
|
|
115.
|
____ queries the status of the /dev/st0 tape.
a. | rsync --status /dev/st0 | c. | tar -f --status
/dev/st0 | b. | ls -s /dev/st0 | d. | mt -f /dev/st0 status |
|
|
116.
|
To position the /dev/nst0 tape at the beginning of the next file, use the
following command: ____.
a. | rsync /dev/nst0 -f 1 | c. | pos /dev/nst0 --begin | b. | mt -f /dev/nst0 fsf
1 | d. | pos /dev/nst0
--top |
|
|
117.
|
To check whether data compression is switched on or off, enter the following
command: ____.
a. | mt -f /dev/st0 datcompression | c. | mt -f /dev/nst0
rewind | b. | mt -f /dev/nst0 offline | d. | mt -f /dev/nst0 fsf 1 |
|
|
118.
|
You can use the command ____ to convert and copy files byte-wise.
|
|
119.
|
The command ____ is actually intended to create copies of complete directories
across a network to a different computer.
|
|
120.
|
You can mirror all home directories by entering the following: ____.
a. | rsync -a /home /shadow | c. | dd -a /home /shadow | b. | tar -a /home /shadow | d. | mt -a /home
/shadow |
|
|
121.
|
You can automate backups in Linux with the ____ service.
|
|
122.
|
Specifying which users can create cron jobs is done through the files
/var/spool/cron/allow and ____, which are evaluated in this order.
a. | /etc/crontab/allow | c. | /root/cron/jobs | b. | /etc/crontab/deny | d. | /var/spool/cron/deny |
|
|
123.
|
To boot the system, you need a program, called the ____, which loads the
operating system kernel and starts the system.
a. | mount point | c. | boot loader | b. | MBR | d. | mounter |
|
|
124.
|
In SLES 9 (by default) the boot process is handled by the boot manager
____.
a. | LILO | c. | WINBOOT | b. | GRUB | d. | LBOOT |
|
|
125.
|
The program code for the first stage of a boot loader is usually installed in
the ____ of the hard disk.
a. | FAT | c. | partition | b. | inode | d. | MBR |
|
|
126.
|
The space in the MBR is limited to ____ bytes.
|
|
127.
|
The files of the boot loader are located in the directory ____.
a. | /boot | c. | /usr | b. | /etc | d. | /root |
|
|
128.
|
You configure GRUB by editing the file ____.
a. | /etc/grub/config | c. | /var/grub.config | b. | /etc/config/grub.config | d. | /boot/grub/menu.lst |
|
|
129.
|
The ____ entry of the /boot/grub/menu.lst, sets the location of the initial
ramdisk.
a. | kernel | c. | default | b. | initrd | d. | timeout |
|
|
130.
|
The GRUB configuration file ____ contains information on how and where the
components of the GRUB boot manager are supposed to be installed.
a. | /etc/grub.conf | c. | /root/grub/config.grub | b. | /var/config/grub | d. | /local/grub.conf |
|
Completion Complete each
statement.
|
|
131.
|
The booting option ____________________ starts the normal installation process.
All modern hardware functions are enabled.
|
|
132.
|
In the boot screen, pressing the function key ____________________ selects a
graphical display mode (such as 640x480 or 1024x768) for the installation.
|
|
133.
|
The installation settings headline ____________________ restarts the hardware
detection process and displays a list of all available hardware components.
|
|
134.
|
A(n) ____________________ partition consists of a continuous range
of cylinders (physical disk areas) assigned to a particular operating system.
|
|
135.
|
The ____________________ partition is used by Linux to move unused data from the
main memory to the hard drive.
|
|
136.
|
The command-line tool ip uses the term ____________________ to
refer to the connection of a device to the network.
|
|
137.
|
The term ____________________ refers to the broadcast address of a
network.
|
|
138.
|
You can use the option -____________________ with the command ip
to display additional statistics information about the devices.
|
|
139.
|
The ____________________ is the amount of time that passes between the
transmission of a packet and the time a corresponding answer is received.
|
|
140.
|
Traceroute uses UDP packets, which are called ____________________.
|
|
141.
|
The complete computer name or ______________________________ is made from the
actual computer name, the domain name, and the name of the TLD.
|
|
142.
|
Slave servers keep a copy of the information on the master server and update
this information at regular intervals. This update is called ____________________.
|
|
143.
|
By default, the DNS master server sends a message to all listed slave servers
(called ____________________) as soon as it has been restarted in order to read in modified zone
files.
|
|
144.
|
In LDAP, a(n) ____________________ is a collection of attributes
that has a globally-unique distinguished name (DN).
|
|
145.
|
The default directory of the data provided by Apache is /srv/www/htdocs. This
directory is also called the ____________________ of the Web server.
|
|
146.
|
A barrier can be the virtual barrier between the home directories of two users
in a UNIX system or a(n) ____________________ between two networks.
|
|
147.
|
Important parts of the communication analysis can be represented in tables, also
known as ____________________.
|
|
148.
|
The ________________________________________ for Linux is a collection of
software modules that handles the authentication process.
|
|
149.
|
In a(n) ____________________, the password cracking program just tries one word
after another from a dictionary file.
|
|
150.
|
______________________________ provide an extension of the traditional file
permission concept.
|
|
151.
|
The best possible method of data backup is the ____________________.
|
|
152.
|
The ____________________ is the time frame available to perform backups.
|
|
153.
|
The ____________________ tool is the most commonly used application for data
backup on Linux systems.
|
|
154.
|
To work with magnetic tapes in SLES 9, use the command
____________________.
|
|
155.
|
___________________________________ is the standard boot loader of SLES 9.
|
Matching
|
|
|
Match each term with the correct statement below. a. | The installation option Installation - ACPI Disabled | f. | A logical volume
group | b. | Memory Test | g. | EVMS | c. | Partitions | h. | RAID 1 | d. | Ext2 | i. | The
purpose of a CA | e. | FAT |
|
|
156.
|
is an older file system used in DOS and Windows.
|
|
157.
|
is to guarantee a trust relationship among all network services that
communicate with each other.
|
|
158.
|
starts the installation process with ACPI disabled.
|
|
159.
|
is an old and proven file system, but it does not include journaling.
|
|
160.
|
is a group of physical partitions.
|
|
161.
|
starts a memory testing program, which tests system RAM by using repeated read
and write cycles.
|
|
162.
|
is also known as hard disk mirroring.
|
|
163.
|
is a similar approach to LVM.
|
|
164.
|
divide the available space of a hard drive into smaller portions.
|
|
|
Match each term with the correct statement below. a. | Driver | f. | ping | b. | Route | g. | ping -l device_addr | c. | ip | h. | ping -i
seconds | d. | ip link set eth0 down | i. | ping -b | e. | ip route delete 149.44.171.0/24 dev
eth0 |
|
|
165.
|
software component that creates the interface to a physical device.
|
|
166.
|
changes the network card configuration quickly from the command line.
|
|
167.
|
specifies the number of seconds to wait between individual packet
shipments.
|
|
168.
|
is the path an IP packet takes from the source to the destination host.
|
|
169.
|
specifies the network device to be used on a computer with several network
devices.
|
|
170.
|
deletes the route to the network 149.44.171.0 assigned to the device
eth0.
|
|
171.
|
sends packets to the broadcast address of the network.
|
|
172.
|
disables the eth0 network device.
|
|
173.
|
lets you check network connections in a simple way between two hosts.
|
|
|
Match each term with the correct statement below a. | DNS | f. | OpenLDAP | b. | /etc/named.conf | g. | The Apache Web server | c. | /var/lib/named/master/ | h. | /etc/apache2/default-server.conf | d. | /etc/nsswitch.conf | i. | smbpasswd -a tux | e. | dig
command |
|
|
174.
|
normally used to troubleshoot DNS problems.
|
|
175.
|
main Apache Web server configuration file.
|
|
176.
|
used for the database files of a DNS master server.
|
|
177.
|
sets an SMB password for the user tux.
|
|
178.
|
configures the name service switch, which is responsible for resolving host
names, network names, users, and groups.
|
|
179.
|
the most popular open source LDAP suite.
|
|
180.
|
the DNS server configuration file.
|
|
181.
|
the leading Web server software.
|
|
182.
|
consists of several domains that can be divided into subdomains.
|
|
|
Match each item with a statement below. a. | The expense of securing individual
resources | f. | Level 2 (Networked Workstation) | b. | Modern BIOS versions | g. | www.suse.de/en/business/security.html | c. | insserv -r
service_name | h. | www.securityfocus.com/ | d. | pam_unix2.so module | i. | The YaST Online Update (YOU)
module | e. | command getfacl |
|
|
183.
|
have the option of protecting the boot process with a password.
|
|
184.
|
removes a service from its default run levels.
|
|
185.
|
determined by the amount of potential damage that could be caused by an attack,
a faulty operation, or a natural catastrophe.
|
|
186.
|
provides an intermediate level of local security. It is suitable for
workstations that are connected to a network.
|
|
187.
|
is necessary when changing a password.
|
|
188.
|
can be used to display the ACL of a file.
|
|
189.
|
downloads and installs software updates and security patches.
|
|
190.
|
is a Web site about general IT security.
|
|
191.
|
is the central security information site of SUSE.
|
|
|
Match each item with a statement below. a. | Tape drives | f. | The Rescue
System | b. | tar -tvf /backup/etc.tar | g. | mount -t reiserfs /dev/hda6 /mnt | c. | mt -f /dev/nst0 offline | h. | GRUB | d. | dd if=/dev/sda
of=/tmp/mbr_copy bs=512 count=1 | i. | The root= option of the /boot/grub/menu.lst file | e. | rsync |
|
|
192.
|
displays the contents of the /backup/etc.tar file.
|
|
193.
|
ejects the tape from the drive.
|
|
194.
|
is a Linux system that can be booted directly from the installation
media.
|
|
195.
|
mounts the partition /dev/hda6 into the directory /mnt.
|
|
196.
|
specifies the root partition of the system.
|
|
197.
|
can be used to access files by means of filenames even before the operating
system is loaded.
|
|
198.
|
is the ideal tool to mirror the content of directories or to back up data
across a network.
|
|
199.
|
creates a copy of the MBR from the hard disk /dev/sda and writes it to the file
/tmp/mbr_copy.
|
|
200.
|
are used most often for backups because they still have the best
price-to-capacity ratio.
|
Short Answer
|
|
201.
|
What is the format used by almost all YaST installation dialog boxes?
|
|
202.
|
What are the installation modes available with SLES 9?
|
|
203.
|
What are some of the reasons to manually change the SLES partitioning proposed
by YaST?
|
|
204.
|
How can you determine the size of the root partition?
|
|
205.
|
Explain several partition scheme examples for different server types.
|
|
206.
|
How can you change YaST’s partitioning proposal?
|
|
207.
|
What should you do before resizing a FAT or NTFS partition?
|
|
208.
|
What are the advantages of using logical volumes?
|
|
209.
|
What are the differences between Hardware RAID and Software RAID?
|
|
210.
|
How can you configure the Graphics Card using YaST?
|
|
211.
|
Describe the possible attribute values displayed by the ip link show
command.
|
|
212.
|
What is the information displayed by the ip -s link show command?
|
|
213.
|
How can you assign an IP address to a device?
|
|
214.
|
How can you delete the IP address from a device?
|
|
215.
|
How can you start and stop configured devices?
|
|
216.
|
Explain how to set a route to the locally connected network.
|
|
217.
|
What is the content of a typical routing configuration file?
|
|
218.
|
What is the content of a typical name resolution configuration file?
|
|
219.
|
What is the information displayed by the ping command?
|
|
220.
|
How does traceroute work?
|
|
221.
|
How did name resolution work in the early days of the Internet?
|
|
222.
|
What were the first seven TLDs available in the early days of DNS?
|
|
223.
|
Explain how to install and configure the BIND server software.
|
|
224.
|
What is the structure of the DNS zone files?
|
|
225.
|
What are the types of entries you can find in the /etc/resolv.conf file?
|
|
226.
|
How can you find more information about DNS?
|
|
227.
|
What is the basic functionality of a Web server?
|
|
228.
|
Describe some of the most important Apache configuration files.
|
|
229.
|
How can you create an RSA key pair?
|
|
230.
|
How can you mount SMB shares into the Linux file system?
|
|
231.
|
Describe some of the questions you should ask yourself when determining your
protection needs.
|
|
232.
|
Why should you place a server in a separate, locked room?
|
|
233.
|
How can you secure the GRUB boot loader with a password?
|
|
234.
|
How does PAM work?
|
|
235.
|
What is the basic rule for user write access?
|
|
236.
|
What are some of the Linux files that contain passwords?
|
|
237.
|
Define the following ACL terms: user class, access ACL, default ACL, and ACL
entry.
|
|
238.
|
Explain how applications handle ACLs.
|
|
239.
|
Provide an example of how to configure the ACL of a directory.
|
|
240.
|
How can you register your SLES 9 product?
|
|
241.
|
Why should backups be performed when the system is not used?
|
|
242.
|
What are the advantages and disadvantages of incremental backups?
|
|
243.
|
What are the advantages and disadvantages of differential backups?
|
|
244.
|
Explain how to create tar archives.
|
|
245.
|
How can you use the find command to search for files to back up?
|
|
246.
|
Explain how to perform remote copying with rsync.
|
|
247.
|
How can you automate data backups with the cron service?
|
|
248.
|
What are some of the most common boot problems?
|
|
249.
|
Explain how to boot a corrupted system directly into a shell.
|
|
250.
|
What is the general structure of the file /boot/grub/menu.lst?
|