Name: 
 

CEN2514_MidTerm Review



True/False
Indicate whether the statement is true or false.
 

 1. 

In the boot screen, pressing F5 selects an installation language.
 

 2. 

YaST selects the keyboard layout according to your language settings.
 

 3. 

JFS is a journaling file system developed by SGI.
 

 4. 

A logical volume cannot be formatted and mounted like a physical partition.
 

 5. 

The root account should only be used for system administration, maintenance, and repair.
 

 6. 

In Linux, interfaces to Ethernet adapters follow the naming scheme eth0, eth1, eth2, and so on.
 

 7. 

You cannot assign more than one IP address to a device.
 

 8. 

You can use the ip tool to configure the routing table of the Linux kernel.
 

 9. 

Routing settings made with the ip tool are kept even after you reboot your system.
 

 10. 

If the ping command works, then both the physical and logical connections are correctly set up between the two hosts.
 

 11. 

The Domain Name System (DNS) is one of the most important network services.
 

 12. 

The names of the mail servers for the domain (MX entry) can be alias names.
 

 13. 

LDAP runs over TCP/IP or other connection-oriented transfer services.
 

 14. 

SLES 9 ships with two Apache versions: Apache series 1 and Apache series 2.
 

 15. 

SMB services are provided by the NetBIOS protocol.
 

 16. 

Resources are differentiated according to what a user needs and how the access to these resources is controlled.
 

 17. 

The best way to prevent physical access to a server is to lock the server in a dedicated server room.
 

 18. 

The more software is installed, the less likely security problems will occur.
 

 19. 

ACLs are a feature of the Linux kernel and are not supported by the ReiserFS, Ext2, and Ext3 file systems.
 

 20. 

A check algorithm is applied before any process or application is granted access to an ACL-protected file system object.
 

 21. 

Backing up data is one of the most important tasks of a system administrator.
 

 22. 

Normally the data in the tar archive files is compressed.
 

 23. 

When copying data, rsync compares the source and the target directory and transfers only data that has changed or been created.
 

 24. 

Backing up data is a task that you should perform on a regular basis.
 

 25. 

Stage 2 of GRUB includes file system drivers for ReiserFS, ext2, ext3, Minix, JFS, XFS, FAT, and FFS (BSD).
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 26. 

The booting option ____ boots the system installed on the hard disk.
a.
Installation
c.
Installation - ACPI Disabled
b.
Boot from Hard Disk
d.
Installation - Safe Settings
 

 27. 

The booting option ____ starts the installation process with the DMA mode and any interfering power management functions disabled.
a.
Installation
c.
Installation - ACPI Disabled
b.
Boot from Hard Disk
d.
Installation - Safe Settings
 

 28. 

When you select the ____ mode, you can load driver modules manually and change the advanced installation settings.
a.
Manual Installation
c.
Rescue System
b.
Installation - Safe Settings
d.
Boot from Hard Disk
 

 29. 

____ starts a minimal Linux system without a graphical user interface to allow experts to access disk partitions for troubleshooting and repairing an installed system.
a.
Boot from Hard Disk
c.
Rescue System
b.
Installation
d.
Memory Test
 

 30. 

In the boot screen, pressing the function key ____ selects an installation media type.
a.
F1
c.
F5
b.
F3
d.
F7
 

 31. 

In the boot screen, pressing the function key ____ opens context-sensitive help for the currently selected option of the boot screen.
a.
F1
c.
F5
b.
F3
d.
F7
 

 32. 

In the boot screen, pressing the function key ____ adds a driver update CD or DVD to the installation process.
a.
F3
c.
F5
b.
F4
d.
F6
 

 33. 

For a normal installation, select ____ installation mode and then select OK to proceed to the next step.
a.
Update an existing system
c.
New Installation
b.
Boot installed system
d.
Repair Installed System
 

 34. 

The installation settings headline ____ changes the installation mode.
a.
System
c.
Mouse
b.
Mode
d.
Partitioning
 

 35. 

If the automatically generated partitioning scheme does not fit your needs, you can change it by selecting the ____ headline.
a.
System
c.
Mouse
b.
Mode
d.
Partitioning
 

 36. 

If you use only primary partitions, you are limited to ____ partitions per hard disk.
a.
4
c.
7
b.
6
d.
8
 

 37. 

____ partitions are continuous ranges of disk cylinders,but can be subdivided into logical partitions.
a.
Primary
c.
Extended
b.
Logical
d.
Physical
 

 38. 

____ partitions do not require entries in the main partition table.
a.
Primary
c.
Extended
b.
Logical
d.
Physical
 

 39. 

The maximum number of logical partitions is fifteen on SCSI disks and ____ on (E)IDE disks.
a.
43
c.
63
b.
55
d.
75
 

 40. 

The ____ partition is the partition for the operating system itself, and is mounted under / in the installed system.
a.
swap
c.
user
b.
file
d.
root
 

 41. 

____ is the successor of Ext2 and offers a journaling feature.
a.
Ext3
c.
FAT32
b.
FAT16
d.
Swap
 

 42. 

Using ____ you can create logical volumes, which spread over several physical disks and partitions.
a.
LDAP
c.
LVM
b.
Scan Disk
d.
Defrag
 

 43. 

With RAID ____, two hard disks are pooled together.
a.
0
c.
2
b.
1
d.
5
 

 44. 

In SLES 9, ____ is the name of the superuser, the administrator of the system.
a.
admin
c.
main
b.
sys
d.
root
 

 45. 

You can run a(n) ____ service on your host to have a central facility managing a range of configuration settings.
a.
CA
c.
DHCP
b.
LDAP
d.
FTP
 

 46. 

The ____ authentication method configures the system to use the traditional file-based authentication method.
a.
Local (/etc/passwd)
c.
LDAP
b.
NIS
d.
DHCP
 

 47. 

____ is the network adapter built into the system.
a.
Device
c.
Address
b.
Link
d.
Broadcast
 

 48. 

The SLES command-line tools for the network configuration use the term ____ when they actually mean an interface.
a.
address
c.
device
b.
link
d.
broadcast
 

 49. 

The term ____ refers to the IP address assigned to a device.
a.
broadcast
c.
device
b.
link
d.
address
 

 50. 

By sending a network packet to the ____ address, you can reach all hosts in the locally connected network at the same time.
a.
device
c.
interface
b.
broadcast
d.
link
 

 51. 

The term ____ refers to an entry in the routing table of the Linux kernel.
a.
broadcast
c.
route
b.
driver
d.
interface
 

 52. 

To display the IP address setup of all devices, enter the following command: ____.
a.
ip address show
c.
ip address delete
b.
ip link show
d.
ip address up
 

 53. 

If you are only interested in the device attributes and not in the IP address setup, you can enter the following command: ____.
a.
ip address show
c.
ip link add
b.
ip link show
d.
ip address attr
 

 54. 

You can enter the following command to verify the assigned IP address: ____.
a.
ip link del dev eth0
c.
ip address --show dev eth0
b.
ip address ip dev eth0
d.
ip address show dev eth0
 

 55. 

To enable a network device (such as eth0), enter the following command: ____.
a.
ip link set eth0 down
c.
ip link set eth0 enable
b.
ip link set eth0 up
d.
ip link set eth0 start
 

 56. 

The configuration files for network devices are located in the directory ____.
a.
/var/sysconfig/network
c.
/local/sysconfig/network
b.
/usr/etc/sysconfig/network
d.
/etc/sysconfig/network
 

 57. 

For Ethernet devices, the configuration filenames consist of ____- and the hardware address of the device.
a.
ifcfg-eth-id
c.
eth-id-config
b.
sysconfig-eth
d.
cfg-id-eth
 

 58. 

The file ____ contains a template that you can use as a base for device configuration files.
a.
/doc/sysconfig/network/ifcfg.template
c.
/etc/sysconfig/network/ifcfg.template
b.
/local/sysconfig/network/ifcfg.template
d.
/var/network/ifcfg.template
 

 59. 

To view the current routing table, enter the following command: ____.
a.
ip route show
c.
ip link show
b.
ip address show
d.
ip link route
 

 60. 

Routes to the directly connected network are automatically set up when a device is started. All other routes are saved in the configuration file ____.
a.
/local/sysconfig/network/routes
c.
/network/sysconfig/network/routes
b.
/etc/sysconfig/network/routes
d.
/inet.d/sysconfig/network/routes
 

 61. 

The host name is configured in the file ____.
a.
/sys/HOSTNAME
c.
/etc/HOSTNAME
b.
/local/HOSTNAME
d.
/var/HOSTNAME
 

 62. 

The name resolution is configured in the file ____.
a.
/var/resolv.conf
c.
/sys/resolv.conf
b.
/network/resolv.conf
d.
/etc/resolv.conf
 

 63. 

Ping keeps sending packets until it’s terminated by pressing ____.
a.
Ctrl+A
c.
Ctrl+C
b.
Ctrl+B
d.
Ctrl+D
 

 64. 

The ping command ____ option, specifies the number of packets to be sent. After this number has been reached, ping is terminated.
a.
-c count
c.
-f
b.
-l device_addr
d.
-n
 

 65. 

ping ____ sends packets without waiting for a reply.
a.
-f
c.
-n
b.
-l preload
d.
-w maxwait
 

 66. 

ping ____ specifies a timeout in seconds, before ping exits regardless of how many packets have been sent or received.
a.
-f
c.
-n
b.
-l preload
d.
-w maxwait
 

 67. 

The diagnosis tool ____ is primarily used to check the routing between different networks.
a.
ping
c.
ip
b.
traceroute
d.
nstat
 

 68. 

____ is a distributed database system that allows local administration of areas and guarantees unique computer names worldwide.
a.
SMB
c.
Samba
b.
DNS
d.
LDAP
 

 69. 

There are over ____ computers worldwide that act as DNS root name servers.
a.
13
c.
33
b.
23
d.
43
 

 70. 

For each domain there is one DNS server (or name server) defined as being “in charge” of its domain. This server is known as the ____ server.
a.
secondary
c.
master
b.
slave
d.
key
 

 71. 

The DNS ____ makes a request to a DNS server, interprets the answer (real information or error message), and sends back this information to the program that called it up.
a.
slave server
c.
name server
b.
database
d.
resolver
 

 72. 

A ____ DNS server does not manage its own databases but merely accepts queries and forwards them to other DNS servers.
a.
master
c.
caching-only
b.
primary
d.
slave
 

 73. 

To define a mail server for the domain, a(n) ____ entry must be made in the DNS database file for forward resolution.
a.
MX
c.
NS
b.
SOA
d.
CNAME
 

 74. 

If you want a computer to be reached by more than one name, then corresponding aliases must be given using ____ entries.
a.
MX
c.
PTR
b.
SOA
d.
CNAME
 

 75. 

As soon as a DNS slave server is started, it connects to the master server and receives from it a copy of the zone files. This is called a ____.
a.
notify
c.
name list
b.
zone transfer
d.
name resolution
 

 76. 

The most important command-line tool for querying a DNS server is called ____.
a.
host
c.
dns
b.
dig
d.
dnslookup
 

 77. 

____ is a lightweight protocol for accessing directory services.
a.
DNS
c.
FTP
b.
HTTP
d.
LDAP
 

 78. 

The configuration files for OpenLDAP are located in the directory ____.
a.
/var/openldap/
c.
/sys/config/ldap/
b.
/etc/openldap/
d.
/openldap/config/
 

 79. 

OpenLDAP provides the command ____ to insert data that is in LDIF format into the directory.
a.
mount
c.
ldapadd
b.
host
d.
dig
 

 80. 

SLES 9 comes with the graphical LDAP browser ____.
a.
host
c.
lookup
b.
dig
d.
GQ
 

 81. 

If you want the Web server to start up at boot time, you need to enter the following: ____.
a.
http://localhost
c.
http://your_system_IP_address
b.
insserv apache2
d.
rcapache2 stop
 

 82. 

The configuration of the Apache Web server is spread over several configuration files located in the directory ____.
a.
/var/apache/conf
c.
/etc/apache2
b.
/sys/conf/apache
d.
/usr/apache2/conf
 

 83. 

The options of the Apache configuration files are called ____.
a.
directives
c.
parameters
b.
includes
d.
conf-sections
 

 84. 

Apache can use the ____ protocol to encrypt the connection.
a.
HTTP
c.
FTP
b.
SSL
d.
SMB
 

 85. 

A public key that is signed by a CA is called a ____.
a.
Ticket
c.
Token
b.
VISA
d.
Certificate
 

 86. 

The ____ protocol is a network protocol that provides file and print services in a Windows network.
a.
SMB
c.
SSL
b.
DNS
d.
DN
 

 87. 

____ enables Linux to use SMB so that Linux can work in a Windows environment.
a.
UNC
c.
Samba
b.
SSL
d.
HTTP
 

 88. 

File or print services offered by a Samba server are called ____.
a.
directives
c.
ObjectClasses
b.
shares
d.
container objects
 

 89. 

Creating a security concept begins with a ____ analysis.
a.
return of investment
c.
communication
b.
risk
d.
barrier
 

 90. 

The ____ determines what security demands are required for specific data and resources.
a.
security policy
c.
ROI analysis
b.
communication analysis
d.
barrier study
 

 91. 

The ____ represents the lowest level of software and lies underneath the operating system.
a.
Boot Loader
c.
MBR
b.
GRUB
d.
BIOS
 

 92. 

You can use the following command to check which services are configured to start and their run levels: ____.
a.
chk --config
c.
config --check
b.
chkconfig -l
d.
cfg --chk
 

 93. 

Authentication on a Linux system is based on ____.
a.
GRUB
c.
LDAP
b.
SMB
d.
PAM
 

 94. 

The PAM modules are located in the directory ____.
a.
/etc/security
c.
/lib/security
b.
/usr/security
d.
/security/pam
 

 95. 

PAM configuration is done in the directory ____.
a.
/lib/pam.d/
c.
/usr/pam.d/
b.
/etc/pam.d/
d.
/local/security/pam.d
 

 96. 

The ____ module sets resource limits for the users that can be configured in the file /etc/security/limits.conf.
a.
pam_limits.so
c.
pam_pwcheck.so
b.
pam_unix2.so
d.
pam_env.so
 

 97. 

The Apache Web server runs under the user id of the user ____.
a.
apache
c.
wwwapache
b.
wwwrun
d.
apachesvr
 

 98. 

If the ____ bit is set for an executable, the program is started under the user ID of the owner of the file.
a.
SUID
c.
sticky
b.
SGID
d.
SSID
 

 99. 

If the ____ bit is set, it lets a program run under the GID of the group to which the executable file belongs.
a.
sticky
c.
SSID
b.
SUID
d.
SGID
 

 100. 

The ____ bit prevents users from deleting each others files that are stored in these directories.
a.
SUID
c.
sticky
b.
SGID
d.
SSID
 

 101. 

Traditionally, three sets of permissions are defined for each file object on a Linux system. These sets include the read (r), write (w), and ____ permissions.
a.
delete (d)
c.
copy (c)
b.
erase (e)
d.
execute (x)
 

 102. 

A(n) ____ ACL comprises the entries for the types owner, owning group, and other, which correspond to the conventional permission bits for files and directories.
a.
maximum
c.
minimum
b.
extended
d.
comprehensive
 

 103. 

A(n) ____ ACL contains a mask entry and can contain several entries of the named user and named group types.
a.
maximum
c.
minimum
b.
extended
d.
comprehensive
 

 104. 

The command ____ can be used to change the ACL of a file.
a.
setfacl
c.
lsfacl
b.
getfacl
d.
chgfacl
 

 105. 

A(n) ____ ACL is a special kind of ACL that defines the access permissions that objects under the directory inherit when they are created.
a.
extended
c.
subdirectory
b.
default
d.
file
 

 106. 

____ enables a high level of local security. Systems that are used as a network server should be run with this setting.
a.
Level 1 (Home Workstation)
c.
Level 3 (Network Server)
b.
Level 2 (Networked Workstation)
d.
Custom Settings
 

 107. 

____ represents the lowest level of local security. It should only be used on a home workstation that is not connected to any kind of network.
a.
Level 1 (Home Workstation)
c.
Level 3 (Network Server)
b.
Level 2 (Networked Workstation)
d.
Custom Settings
 

 108. 

____ lets you create your own level of local security.
a.
Level 1 (Home Workstation)
c.
Level 3 (Network Server)
b.
Level 2 (Networked Workstation)
d.
Custom Settings
 

 109. 

The Web site ____ offers an overview of all SUSE related mailing lists.
a.
www.suse.de/en/business/mailinglists.html
b.
www.securityfocus.com/
c.
www.susesecurity.com/
d.
www.linux.suse.security.de/
 

 110. 

In a(n) ____ backup, all system data is copied to a backup media once a day.
a.
full
c.
differential
b.
incremental
d.
exclusive
 

 111. 

The disadvantage of the full backup method is the ____.
a.
backup network
c.
backup window
b.
backup media
d.
backup strategy
 

 112. 

In a(n) ____ backup, you normally perform a full backup once a week. Then you perform a backup every day that copies only files that have changed since the backup the day before.
a.
full
c.
complete
b.
incremental
d.
differential
 

 113. 

In a(n) ____ backup, you perform a full backup once a week, then you perform backups every day to record the files that have changed since the last full backup.
a.
full
c.
complete
b.
incremental
d.
differential
 

 114. 

The ____ format is a container format for files and directory structures. By convention, the extension of the archive files end in .tar.
a.
exe
c.
tar
b.
zip
d.
gz
 

 115. 

____ queries the status of the /dev/st0 tape.
a.
rsync --status /dev/st0
c.
tar -f --status /dev/st0
b.
ls -s /dev/st0
d.
mt -f /dev/st0 status
 

 116. 

To position the /dev/nst0 tape at the beginning of the next file, use the following command: ____.
a.
rsync /dev/nst0 -f 1
c.
pos /dev/nst0 --begin
b.
mt -f /dev/nst0 fsf 1
d.
pos /dev/nst0 --top
 

 117. 

To check whether data compression is switched on or off, enter the following command: ____.
a.
mt -f /dev/st0 datcompression
c.
mt -f /dev/nst0 rewind
b.
mt -f /dev/nst0 offline
d.
mt -f /dev/nst0 fsf 1
 

 118. 

You can use the command ____ to convert and copy files byte-wise.
a.
tar
c.
mt
b.
dd
d.
rsync
 

 119. 

The command ____ is actually intended to create copies of complete directories across a network to a different computer.
a.
tar
c.
dd
b.
mt
d.
rsync
 

 120. 

You can mirror all home directories by entering the following: ____.
a.
rsync -a /home /shadow
c.
dd -a /home /shadow
b.
tar -a /home /shadow
d.
mt -a /home /shadow
 

 121. 

You can automate backups in Linux with the ____ service.
a.
dd
c.
cron
b.
tar
d.
mt
 

 122. 

Specifying which users can create cron jobs is done through the files /var/spool/cron/allow and ____, which are evaluated in this order.
a.
/etc/crontab/allow
c.
/root/cron/jobs
b.
/etc/crontab/deny
d.
/var/spool/cron/deny
 

 123. 

To boot the system, you need a program, called the ____, which loads the operating system kernel and starts the system.
a.
mount point
c.
boot loader
b.
MBR
d.
mounter
 

 124. 

In SLES 9 (by default) the boot process is handled by the boot manager ____.
a.
LILO
c.
WINBOOT
b.
GRUB
d.
LBOOT
 

 125. 

The program code for the first stage of a boot loader is usually installed in the ____ of the hard disk.
a.
FAT
c.
partition
b.
inode
d.
MBR
 

 126. 

The space in the MBR is limited to ____ bytes.
a.
116
c.
446
b.
226
d.
556
 

 127. 

The files of the boot loader are located in the directory ____.
a.
/boot
c.
/usr
b.
/etc
d.
/root
 

 128. 

You configure GRUB by editing the file ____.
a.
/etc/grub/config
c.
/var/grub.config
b.
/etc/config/grub.config
d.
/boot/grub/menu.lst
 

 129. 

The ____ entry of the /boot/grub/menu.lst, sets the location of the initial ramdisk.
a.
kernel
c.
default
b.
initrd
d.
timeout
 

 130. 

The GRUB configuration file ____ contains information on how and where the components of the GRUB boot manager are supposed to be installed.
a.
/etc/grub.conf
c.
/root/grub/config.grub
b.
/var/config/grub
d.
/local/grub.conf
 

Completion
Complete each statement.
 

 131. 

The booting option ____________________ starts the normal installation process. All modern hardware functions are enabled.
 

 

 132. 

In the boot screen, pressing the function key ____________________ selects a graphical display mode (such as 640x480 or 1024x768) for the installation.
 

 

 133. 

The installation settings headline ____________________ restarts the hardware detection process and displays a list of all available hardware components.
 

 

 134. 

A(n) ____________________ partition consists of a continuous range of cylinders (physical disk areas) assigned to a particular operating system.
 

 

 135. 

The ____________________ partition is used by Linux to move unused data from the main memory to the hard drive.
 

 

 136. 

The command-line tool ip uses the term ____________________ to refer to the connection of a device to the network.
 

 

 137. 

The term ____________________ refers to the broadcast address of a network.
 

 

 138. 

You can use the option -____________________ with the command ip to display additional statistics information about the devices.
 

 

 139. 

The ____________________ is the amount of time that passes between the transmission of a packet and the time a corresponding answer is received.
 

 

 140. 

Traceroute uses UDP packets, which are called ____________________.
 

 

 141. 

The complete computer name or ______________________________ is made from the actual computer name, the domain name, and the name of the TLD.
 

 

 142. 

Slave servers keep a copy of the information on the master server and update this information at regular intervals. This update is called ____________________.
 

 

 143. 

By default, the DNS master server sends a message to all listed slave servers (called ____________________) as soon as it has been restarted in order to read in modified zone files.
 

 

 144. 

In LDAP, a(n) ____________________ is a collection of attributes that has a globally-unique distinguished name (DN).
 

 

 145. 

The default directory of the data provided by Apache is /srv/www/htdocs. This directory is also called the ____________________ of the Web server.
 

 

 146. 

A barrier can be the virtual barrier between the home directories of two users in a UNIX system or a(n) ____________________ between two networks.
 

 

 147. 

Important parts of the communication analysis can be represented in tables, also known as ____________________.
 

 

 148. 

The ________________________________________ for Linux is a collection of software modules that handles the authentication process.
 

 

 149. 

In a(n) ____________________, the password cracking program just tries one word after another from a dictionary file.
 

 

 150. 

______________________________ provide an extension of the traditional file permission concept.
 

 

 151. 

The best possible method of data backup is the ____________________.
 

 

 152. 

The ____________________ is the time frame available to perform backups.
 

 

 153. 

The ____________________ tool is the most commonly used application for data backup on Linux systems.
 

 

 154. 

To work with magnetic tapes in SLES 9, use the command ____________________.
 

 

 155. 

___________________________________ is the standard boot loader of SLES 9.
 

 

Matching
 
 
Match each term with the correct statement below.
a.
The installation option Installation - ACPI Disabled
f.
A logical volume group
b.
Memory Test
g.
EVMS
c.
Partitions
h.
RAID 1
d.
Ext2
i.
The purpose of a CA
e.
FAT
 

 156. 

is an older file system used in DOS and Windows.
 

 157. 

is to guarantee a trust relationship among all network services that communicate with each other.
 

 158. 

starts the installation process with ACPI disabled.
 

 159. 

is an old and proven file system, but it does not include journaling.
 

 160. 

is a group of physical partitions.
 

 161. 

starts a memory testing program, which tests system RAM by using repeated read and write cycles.
 

 162. 

is also known as hard disk mirroring.
 

 163. 

is a similar approach to LVM.
 

 164. 

divide the available space of a hard drive into smaller portions.
 
 
Match each term with the correct statement below.
a.
Driver
f.
ping
b.
Route
g.
ping -l device_addr
c.
ip
h.
ping -i seconds
d.
ip link set eth0 down
i.
ping -b
e.
ip route delete 149.44.171.0/24 dev eth0
 

 165. 

software component that creates the interface to a physical device.
 

 166. 

changes the network card configuration quickly from the command line.
 

 167. 

specifies the number of seconds to wait between individual packet shipments.
 

 168. 

is the path an IP packet takes from the source to the destination host.
 

 169. 

specifies the network device to be used on a computer with several network devices.
 

 170. 

deletes the route to the network 149.44.171.0 assigned to the device eth0.
 

 171. 

sends packets to the broadcast address of the network.
 

 172. 

disables the eth0 network device.
 

 173. 

lets you check network connections in a simple way between two hosts.
 
 
Match each term with the correct statement below
a.
DNS
f.
OpenLDAP
b.
/etc/named.conf
g.
The Apache Web server
c.
/var/lib/named/master/
h.
/etc/apache2/default-server.conf
d.
/etc/nsswitch.conf
i.
smbpasswd -a tux
e.
dig command
 

 174. 

normally used to troubleshoot DNS problems.
 

 175. 

main Apache Web server configuration file.
 

 176. 

used for the database files of a DNS master server.
 

 177. 

sets an SMB password for the user tux.
 

 178. 

configures the name service switch, which is responsible for resolving host names, network names, users, and groups.
 

 179. 

the most popular open source LDAP suite.
 

 180. 

the DNS server configuration file.
 

 181. 

the leading Web server software.
 

 182. 

consists of several domains that can be divided into subdomains.
 
 
Match each item with a statement below.
a.
The expense of securing individual resources
f.
Level 2 (Networked Workstation)
b.
Modern BIOS versions
g.
www.suse.de/en/business/security.html
c.
insserv -r service_name
h.
www.securityfocus.com/
d.
pam_unix2.so module
i.
The YaST Online Update (YOU) module
e.
command getfacl
 

 183. 

have the option of protecting the boot process with a password.
 

 184. 

removes a service from its default run levels.
 

 185. 

determined by the amount of potential damage that could be caused by an attack, a faulty operation, or a natural catastrophe.
 

 186. 

provides an intermediate level of local security. It is suitable for workstations that are connected to a network.
 

 187. 

is necessary when changing a password.
 

 188. 

can be used to display the ACL of a file.
 

 189. 

downloads and installs software updates and security patches.
 

 190. 

is a Web site about general IT security.
 

 191. 

is the central security information site of SUSE.
 
 
Match each item with a statement below.
a.
Tape drives
f.
The Rescue System
b.
tar -tvf /backup/etc.tar
g.
mount -t reiserfs /dev/hda6 /mnt
c.
mt -f /dev/nst0 offline
h.
GRUB
d.
dd if=/dev/sda of=/tmp/mbr_copy bs=512 count=1
i.
The root= option of the /boot/grub/menu.lst file
e.
rsync
 

 192. 

displays the contents of the /backup/etc.tar file.
 

 193. 

ejects the tape from the drive.
 

 194. 

is a Linux system that can be booted directly from the installation media.
 

 195. 

mounts the partition /dev/hda6 into the directory /mnt.
 

 196. 

specifies the root partition of the system.
 

 197. 

can be used to access files by means of filenames even before the operating system is loaded.
 

 198. 

is the ideal tool to mirror the content of directories or to back up data across a network.
 

 199. 

creates a copy of the MBR from the hard disk /dev/sda and writes it to the file /tmp/mbr_copy.
 

 200. 

are used most often for backups because they still have the best price-to-capacity ratio.
 

Short Answer
 

 201. 

What is the format used by almost all YaST installation dialog boxes?
 

 202. 

What are the installation modes available with SLES 9?
 

 203. 

What are some of the reasons to manually change the SLES partitioning proposed by YaST?
 

 204. 

How can you determine the size of the root partition?
 

 205. 

Explain several partition scheme examples for different server types.
 

 206. 

How can you change YaST’s partitioning proposal?
 

 207. 

What should you do before resizing a FAT or NTFS partition?
 

 208. 

What are the advantages of using logical volumes?
 

 209. 

What are the differences between Hardware RAID and Software RAID?
 

 210. 

How can you configure the Graphics Card using YaST?
 

 211. 

Describe the possible attribute values displayed by the ip link show command.
 

 212. 

What is the information displayed by the ip -s link show command?
 

 213. 

How can you assign an IP address to a device?
 

 214. 

How can you delete the IP address from a device?
 

 215. 

How can you start and stop configured devices?
 

 216. 

Explain how to set a route to the locally connected network.
 

 217. 

What is the content of a typical routing configuration file?
 

 218. 

What is the content of a typical name resolution configuration file?
 

 219. 

What is the information displayed by the ping command?
 

 220. 

How does traceroute work?
 

 221. 

How did name resolution work in the early days of the Internet?
 

 222. 

What were the first seven TLDs available in the early days of DNS?
 

 223. 

Explain how to install and configure the BIND server software.
 

 224. 

What is the structure of the DNS zone files?
 

 225. 

What are the types of entries you can find in the /etc/resolv.conf file?
 

 226. 

How can you find more information about DNS?
 

 227. 

What is the basic functionality of a Web server?
 

 228. 

Describe some of the most important Apache configuration files.
 

 229. 

How can you create an RSA key pair?
 

 230. 

How can you mount SMB shares into the Linux file system?
 

 231. 

Describe some of the questions you should ask yourself when determining your protection needs.
 

 232. 

Why should you place a server in a separate, locked room?
 

 233. 

How can you secure the GRUB boot loader with a password?
 

 234. 

How does PAM work?
 

 235. 

What is the basic rule for user write access?
 

 236. 

What are some of the Linux files that contain passwords?
 

 237. 

Define the following ACL terms: user class, access ACL, default ACL, and ACL entry.
 

 238. 

Explain how applications handle ACLs.
 

 239. 

Provide an example of how to configure the ACL of a directory.
 

 240. 

How can you register your SLES 9 product?
 

 241. 

Why should backups be performed when the system is not used?
 

 242. 

What are the advantages and disadvantages of incremental backups?
 

 243. 

What are the advantages and disadvantages of differential backups?
 

 244. 

Explain how to create tar archives.
 

 245. 

How can you use the find command to search for files to back up?
 

 246. 

Explain how to perform remote copying with rsync.
 

 247. 

How can you automate data backups with the cron service?
 

 248. 

What are some of the most common boot problems?
 

 249. 

Explain how to boot a corrupted system directly into a shell.
 

 250. 

What is the general structure of the file /boot/grub/menu.lst?
 



 
Check Your Work     Start Over