Preview

File System and Configuration File

Satisfactory Essays
Open Document
Open Document
1032 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File System and Configuration File
Final Exam Study Guide

1. Which runlevel is textual multi-user mode? Pg 431

3

2. Which system script contains the default runlevel? Pg425

/etc/inittab

Use the following information for study points 3-5:

A system administrator is manually setting up a new daemon named analyzed. The daemon should be set to run at runlevel 3 and be the very last daemon to load.

3. What should the link to start the daemon be named? Pg 426,427

s99analyzed

4. What command would stop the analyzed daemon? Pg 427

service analyzed stop

5. What command would tell the system at which runlevels to start analyzed? Pg 430

chkconfig -level 35 analyzed

6. What command would let you most safely switch to runlevel 2 without rebooting the computer? Pg 431

Telinit 2

7. What type of control does SELinux implement? Pg 414

Mandatory Access Control

8. Know all of the possible states of SELinux . Pg 414

Enforcing Permissive and Disable

9. The files hosts.allow and hosts.deny belong to what security system? Pg 447

TCP Wrappers

10. Given the following entries, what will happen when a client at address 172.16.24.100 tries to access a Web site running on this server? Pg 447-448

hosts.allow

httpd : 172.15.*

vsftpd: 192.168.0.*

sshd: 172.16.24.100

hosts.deny

httpd : 172.*

vsftpd : 172.16.24.100

sshd : 172.16.*

The Connection Will Be Denied

11. Know all of the valid iptables chains. Pg 821

Forward , Input,Output

12. What is the purpose of a chroot jail? Pg 449

to create a directory that a server thinks is the root directory, thereby blocking access by the server to all other areas of the file system

13. Know all of the printing protocol supported by CUPS. Pg 520

LPD/LPR, SMB, IPP

14. Know all of the valid methods of configuring a CUPS server. Pg522,527,533

Command-line tools,Web interface,Printer configuration applet

15. Linux printer driver files end with what extension? Pg 533

.ppd

16. SSH1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Lab Report

    • 782 Words
    • 4 Pages

    In between the end of the procedures and the beginning of the conclusions, staple in pg. 67 from your lab manual, completely filled out.…

    • 782 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Unit 1 Lab 1. Switch CLI Exec Mode Page 1 Unit 2 Lab 1. Switch CLI Exec Mode Page 5 2. Switch CLI Configuration Process I Page 8 3. Switch CLI Configuration Process II Page 10 4.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. What does the /w switch do? And why is it used? I think there are a lot of commands that might use /w for very different reasons... For example: MCP/MCSA/MCTS/MCITP. The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning.…

    • 380 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 59 Assignment 3

    • 645 Words
    • 3 Pages

    The process of how the subroutine works within an operating environment is as follows. While the main part of the program is running, there will be a call command sent to the CPU to tell it to stop wherever the program is at, store the W, Z and status along with where in the main program the CPU is at in the stack. Then the main program is cleared from memory and the subroutine is loaded for the CPU to start processing the code. Once the subroutine has finished, the subroutine code is deleted from memory and the CPU will load up the main program back on and will retrieve from stack the stored information (W, Z and status) which will allow the CPU know exactly where it needs to start from.…

    • 645 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    Yes. See #1 and #7. No, TCP traffic will not be allowed because it was already blocked by IP.…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    8. Why is it unlikely that you will fi nd the IP address 192.168.250.10 on the Internet?…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Unit G Psychology 101

    • 880 Words
    • 4 Pages

    * A. stage 1 NREM, stage 2 NREM, stage 3 NREM, stage 4 NREM, REM sleep…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Plutarch And Daemons

    • 968 Words
    • 4 Pages

    Once asked what a daemon is, what generally comes to mind is an evil guy trying to tempt people into doing things but the Greeks had a different concept of what a daemon is. When comparing what daemons are, there are variations based on area and time period. Alpheus, Plutarch, and Iamblichus seem to agree on three concepts when referring to daemons: they rank between Gods and men in cosmic level, there are different types of daemons, and they can directly influence our life. However they disagree on several matters, such as: how these creatures behave, how much control they have over us, and how we recognize them.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    After creating the guided Change, you must relate the Configuration Item into the guided Change. Copy the CI ID and paste it into the guided Change as follows:…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3, Starts, if found to have abnormalities, should immediately stop running, you must identify and eliminate non-normal, then re-start the crushing machine.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1335757 - Enabling and disabling tracing in XI 3.1 for specific services without requiring a restart…

    • 1170 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Branch Delay

    • 1747 Words
    • 7 Pages

    A technique for minimizing the effect of control dependencies is to separate the point where the branch operation takes effect from the branch tests. The branch instruction performs a test on a branch condition. If the test succeeds, the PC is modified, but the modification does not take effect immediately. This delayed branch allows one or more instructions following the branch to be executed in the pipeline whether the branch is taken or not.…

    • 1747 Words
    • 7 Pages
    Good Essays

Related Topics